diff --git "a/results_retrieval/emb_potion_r32M/retrieval_default_docling.json" "b/results_retrieval/emb_potion_r32M/retrieval_default_docling.json" deleted file mode 100644--- "a/results_retrieval/emb_potion_r32M/retrieval_default_docling.json" +++ /dev/null @@ -1,22210 +0,0 @@ -[ - { - "top_k": 10, - "mrr": 0.4259563492063492, - "recall": 0.6866666666666666, - "count_empty_strings": 4 - }, - [ - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "What does \"new account\" mean according to the international tax compliance from 2020 ?", - "target_page": 2, - "target_passage": "“new account” means a financial account maintained by a reporting financial institution opened on or after 13th May 2020", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "The International Tax Compliance (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n20th April 2020\nLaid before the House of Commons\n21st April 2020\nComing into force\n- -\n13th May 2020\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the Finance Act 2013( a ):", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "Citation and commencement\n1. These Regulations may be cited as the International Tax Compliance (Amendment) Regulations 2020 and come into force on 13th May 2020.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "Transitional provision\n3. -(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an account that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 is treated as beginning on 13th May 2020 and ending on 31st December 2020.\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the calendar year 2020 to the period ending immediately before 13th May 2020 and the period beginning with that date, it is to be apportioned-\n(a) on a time basis according to the respective length of the periods, or\n(b) if that method would produce a result that is unjust or unreasonable, on a just and reasonable basis.\nDavid Rutley Maggie Throup\n20th April 2020\nTwo of the Lords Commissioners of Her Majesty's Treasury", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThe Regulations amend the International Tax Compliance Regulations 2015 ('the principal Regulations') which give effect to agreements and arrangements reached between the United Kingdom and other jurisdictions to improve international tax compliance.\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into by the United Kingdom for the exchange of financial account information with other jurisdictions up to 19th April 2020, the date before the Regulations are made.\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation 2(4)(b) amends the definitions of 'new account' and 'pre-existing account' in relation to those\n( a ) 'Financial account' and 'reporting financial institution' are defined in the table in regulation 24(2) of the principal Regulations.\n( b ) 'The DAC' is defined in regulation 1(3)(a) of the principal Regulations.\n2\naccounts so that these terms are defined by reference to the date that those accounts ceased to be excluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts which were previously excluded accounts.\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-theuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the impacts that apply to this instrument.\n' Crown copyright 2020\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nUK202004201005 04/2020 19585\nhttp://www.legislation.gov.uk/id/uksi/2020/438", - "page_start": 1, - "page_end": 3, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "Compliance with IFRS\nThe financial statements comply with International Financial Reporting Standards (IFRS) adopted by the International Accounting Standards Board (IASB).", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Income Taxes\nIncome tax expense includes both current and deferred taxes. We use judgment to interpret tax rules and regulations to calculate the expense recorded each period. We recognize income tax expense in net income unless it relates to an item recognized directly in equity or other comprehensive income.\nCurrent tax expense is tax we expect to pay or receive based on our taxable income or loss during the year. We calculate the current tax expense using tax rates enacted or substantively enacted at the reporting date, and including any adjustment to taxes payable or receivable related to previous years.\nDeferred tax assets and liabilities arise from temporary differences between the carrying amounts of the assets and liabilities we record in our consolidated statements of financial position and their respective tax bases. We calculate deferred tax assets and liabilities using enacted or substantively enacted tax rates that will apply in the years the temporary differences are expected to reverse.\nDeferred tax assets and liabilities are offset if there is a legally enforceable right to offset current tax liabilities and assets and they relate to income taxes levied by the same authority on:\nGLYPH<129> the same taxable entity, or\nGLYPH<129> different tax entities where these entities intend to settle current tax liabilities and assets on a net basis or the tax assets and liabilities will be realized simultaneously.\nWe recognize a deferred tax asset for unused losses, tax credits and deductible temporary differences to the extent that it is probable that future taxable income will be available to use the asset. We use judgement to evaluate whether we can recover a deferred tax asset based on our assessment on existing tax laws, estimates of future profitability and tax planning strategies.\nWe rely on estimates and assumptions when determining the amount of current and deferred tax, and take into account the impact of uncertain tax positions and whether additional taxes and interest may be due. If new information becomes available and changes our judgment on the adequacy of existing tax liabilities, these changes would affect the income tax expense in the period that we make this determination.\nSee note 9 for more information about our income taxes.", - "page_start": 99, - "page_end": 99, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Income and Other Taxes\nWe make income and other tax provisions based on information currently available in each of the jurisdictions in which we operate. While we believe we have paid and provided for adequate amounts of tax, our business is complex and significant judgement is required in interpreting tax legislation and regulations and estimating future levels of taxable income. Our tax filings are subject to audit by the relevant government revenue authorities and the results of the government audit could materially change the amount of our actual income tax expense, income taxes payable or receivable, other taxes payable or receivable and deferred income tax assets and liabilities and could, in certain circumstances, result in the assessment of interest and penalties.", - "page_start": 83, - "page_end": 83, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Income taxes\nWe are subject to income taxes in the United States, and in several states and foreign jurisdictions in which we operate. We account for income taxes according to Statement of Financial Accounting Standards No. 109, 'Accounting for Income Taxes' ('SFAS 109'). SFAS 109 requires the recognition of deferred tax assets, net of applicable reserves, related to net operating loss carryforwards and certain temporary differences. The standard requires recognition of a future tax benefit to the extent that realization of such benefit is more likely than not. Otherwise, a valuation allowance is applied.\nManagement's Discussion and Analysis of Financial Condition and Results of Operations\nAt December 31, 2004, we had $93 million of deferred tax assets and $1.9 billion of deferred tax liabilities. Except for certain New Jersey state net operating losses and certain other New Jersey state deferred tax assets, we believe that it is more likely than not that our deferred tax assets are fully realizable because of the future reversal of existing taxable temporary differences and future projected taxable income. The valuation allowance at December 31, 2004 related to the New Jersey deferred tax assets was $6 million.\nOur income tax returns are subject to examination by the Internal Revenue Service ('IRS') and other tax authorities. While positions taken in tax returns are sometimes subject to uncertainty in the tax laws, we do not take such positions unless we have 'substantial authority' to do so under the Internal Revenue Code and applicable regulations. We may take positions on our tax returns based on substantial authority that are not ultimately accepted by the IRS.\nWe assess such potential unfavorable outcomes based on the criteria of Statement of Financial Accounting Standards No. 5, 'Accounting for Contingencies' ('SFAS 5'). We establish a tax reserve if an unfavorable outcome is probable and the amount of the unfavorable outcome can be reasonably estimated. We assess the potential outcomes of tax uncertainties on a quarterly basis. In determining whether the probable criterion of SFAS 5 is met, we presume that the taxing authority will focus on the exposure and we assess the probable outcome of a particular issue based upon the relevant legal and technical merits. We also apply our judgment regarding the potential actions by the tax authorities and resolution through the settlement process.", - "page_start": 43, - "page_end": 44, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "(i) Current income tax\nCurrent income tax assets and liabilities are measured at the amount expected to be paid to tax authorities, net of recoveries, based on the tax rates and laws enacted or substantively enacted at the reporting date. Current income tax relating to items recognized directly in equity is recognized in equity and not profit or loss. Management periodically evaluates positions taken in tax returns with respect to situations in which applicable tax regulations are subject to interpretation and establishes provisions where appropriate.", - "page_start": 73, - "page_end": 73, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Income Tax and Other Taxes\nWe collect, pay and accrue significant amounts of income and other taxes such as federal and provincial sales tax, employment taxes and property taxes, for and to various taxation authorities.\nWe have recorded significant amounts of deferred income tax liabilities and current income tax expense, and calculated these amounts based on substantively enacted income tax rates in effect at the relevant time. A legislative change in these rates could have a material impact on the amounts recorded and payable in the future.\nWe have also recorded the benefit of income and other tax positions that are more likely than not of being sustained on examination and are measured at the amount expected to be realized when we have an ultimate settlement with taxation authorities.\nWhile we believe we have paid and provided for adequate amounts of tax, our business is complex and significant judgement is required in interpreting tax legislation and regulations. Our tax filings are subject to audit by the relevant government revenue authorities and the results of the government audit could materially change the amount of our actual income tax expense, income taxes payable or receivable, other taxes payable or receivable and deferred income tax assets or liabilities and could, in certain circumstances, result in an assessment of interest and penalties.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC.\n77\nM A NA G E M E N T ' S D I SCU S SI O N AN D ANAL Y S IS\nMANAGEMENT'S DISCUSSION AND ANALYSIS", - "page_start": 80, - "page_end": 81, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "Under which conditions can the funds of a non-registered pension arrengements be obtained before the age of 55 ?", - "target_page": 2, - "target_passage": "non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "REPUBLIC SERVICES, INC.\n(Exact name of Registrant as SpeciÑed in its Charter)\nDelaware\n65-0716904\n(State of Incorporation)\n(I.R.S. Employer IdentiÑcation No.)\nRepublic Services, Inc. 110 S.E. 6th Street, 28th Floor Fort Lauderdale, Florida\n33301\n(Zip Code)\n(Address of Principal Executive OÇces)\nRegistrant's telephone number, including area code: (954) 769-2400\nSecurities registered pursuant to Section 12(b) of the Act:\nTitle of Each Class\nName of Each Exchange on which Registered\nCommon Stock, par value $.01 per share\nThe New York Stock Exchange\nSecurities registered pursuant to Section 12(g) of the Act: None\nIndicate by check mark whether the registrant: (1) has Ñled all reports required to be Ñled by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to Ñle such reports), and (2) has been subject to such Ñling requirements for the past 90 days. Yes ≤ No n\nIndicate by check mark if disclosure of delinquent Ñlers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in deÑnitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. ≤\nIndicate by check mark whether the registrant is an accelerated Ñler (as deÑned in Rule 12b-2 of the Act). Yes ≤ No n\nAs of June 30, 2004, the aggregate market value of the shares of the Common Stock held by non- aÇliates of the registrant was approximately $4,395,636,476.\nAs of February 18, 2005, the registrant had outstanding 149,670,988 shares of Common Stock.\nDOCUMENTS INCORPORATED BY REFERENCE\nPart III Portions of the Registrant's Proxy Statement relative to the 2005 Annual Meeting of Stockholders.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and by year of first test.\n2004, Age 18-24 = 3,150. 2004, Age 25-29 = 3,319. 2004, Age 30-34 = 2,938. 2004, Age 35-39 = 1,958. 2004, Age 40 over = 881. 2004, Total = 12,246. 2005, Age 18-24 = 2,391. 2005, Age 25-29 = 2,832. 2005, Age 30-34 = 2,548. 2005, Age 35-39 = 1,791. 2005, Age 40 over = 977. 2005, Total = 10,539. 2006, Age 18-24 = 3,635. 2006, Age 25-29 = 3,768. 2006, Age 30-34 = 3,275. 2006, Age 35-39 = 2,491. 2006, Age 40 over = 1,580. 2006, Total = 14,749. 2007, Age 18-24 = 3,182. 2007, Age 25-29 = 3,359. 2007, Age 30-34 = 2,869. 2007, Age 35-39 = 2,178. 2007, Age 40 over = 1,803. 2007, Total = 13,391. 2008, Age 18-24 = 2,912. 2008, Age 25-29 = 3,197. 2008, Age 30-34 = 2,857. 2008, Age 35-39 = 2,425. 2008, Age 40 over = 2,238. 2008, Total = 13,629. 2009, Age 18-24 = 2,711. 2009, Age 25-29 = 2,594. 2009, Age 30-34 = 2,304. 2009, Age 35-39 = 1,998. 2009, Age 40 over = 2,048. 2009, Total = 11,655. 2010, Age 18-24 = 2,287. 2010, Age 25-29 = 2,180. 2010, Age 30-34 = 2,105. 2010, Age 35-39 = 1,744. 2010, Age 40", - "page_start": 18, - "page_end": 18, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 9: Table showing the age breakdown of individuals testing positive for opiates-only or positive-for-both as a proportion of all individuals first testing positive in that year.\n26%, Age 18 - 24 = 27%. 26%, Age 25 - 29 = 24%. 26%, Age 30 - 34 = 16%. 26%, Age 35 - 39 = 7%. 26%, Age 40 over = 100%. 26%, Total = 2004. 23%, Age 18 - 24 = 27%. 23%, Age 25 - 29 = 24%. 23%, Age 30 - 34 = 17%. 23%, Age 35 - 39 = 9%. 23%, Age 40 over = 100%. 23%, Total = 2005. 25%, Age 18 - 24 = 26%. 25%, Age 25 - 29 = 22%. 25%, Age 30 - 34 = 17%. 25%, Age 35 - 39 = 11%. 25%, Age 40 over = 100%. 25%, Total = 2006. 24%, Age 18 - 24 = 25%. 24%, Age 25 - 29 = 21%. 24%, Age 30 - 34 = 16%. 24%, Age 35 - 39 = 13%. 24%, Age 40 over = 100%. 24%, Total = 2007. 21%, Age 18 - 24 = 23%. 21%, Age 25 - 29 = 21%. 21%, Age 30 - 34 = 18%. 21%, Age 35 - 39 = 16%. 21%, Age 40 over = 100%. 21%, Total = 2008. 23%, Age 18 - 24 = 22%. 23%, Age 25 - 29 = 20%. 23%, Age 30 - 34 = 17%. 23%, Age 35 - 39 = 18%. 23%, Age 40 over = 100%. 23%, Total = 2009. 22%, Age 18 - 24 = 21%. 22%, Age 25 - 29 = 20%. 22%, Age 30 - 34 = 17%. 22%, Age 35 - 39 = 20%. 22%, Age 40 over = 100%. 22%, Total = 2010. 22%, Age 18 - 24 = 19%. 22%, Age 25 - 29 = 20%. 22%, Age 30 - 34 = 16%. 22%, Age", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1 HORMEL PLACE AUSTIN, MINNESOTA\n55912-3680\n(Address of principal executive offices)\n(Zip Code)\nRegistrant's telephone number, including area code (507) 437-5611\nSecurities registered pursuant to Section 12 (b) of the Act:\nCOMMON STOCK, PAR VALUE $.0586 PER SHARE\nTitle of Each Class\nNEW YORK STOCK EXCHANGE\nName of Each Exchange On Which Registered\nSecurities registered pursuant to Section 12 (g) of the Act:\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to this Form 10-K. o\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most recently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date.\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows:\nCommon Stock, $.0586 Par Value-138,672,803 shares\nCommon Stock Non-Voting, $.01 Par Value-0 shares", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "NOTE 22: PENSIONS\nWe have contributory and non-contributory defined benefit pension plans that are made available to most of our employees. The plans provide pensions based on years of service, years of contributions and earnings. We do not provide any non-pension post-retirement benefits. We also provide unfunded supplemental pension benefits to certain executives.\nThe assets of the defined benefit pension plans are held in segregated accounts isolated from our assets. We administer the defined benefit pension plans pursuant to applicable regulations, the Statement of Investment Policies and Procedures and to the mandate of the Pension Committee of the Board of Directors. The Pension Committee of the Board of Directors oversees our administration of the defined benefits pension plans, which includes the following principal areas:\nGLYPH<129> overseeing the funding, administration, communication and investment management of the plans\nGLYPH<129> selecting and monitoring the performance of all third parties performing duties in respect of the plans, including audit, actuarial and investment management services\nGLYPH<129> proposing, considering and approving amendments to the defined benefit pension plans\nGLYPH<129> proposing, considering and approving amendments of the Statement of Investment Policies and Procedures\nGLYPH<129> reviewing management and actuarial reports prepared in respect of the administration of the defined benefit pension plans\nGLYPH<129> reviewing and approving the audited financial statements of the defined benefit pension plan funds.\nThe assets of the defined benefit pension plans are invested and managed following all applicable regulations and the Statement of Investment Policies and Procedures, and reflect the characteristics and asset mix of each defined benefit pension plan. Investment and market return risk is managed by:\nGLYPH<129> contracting professional investment managers to execute the investment strategy following the Statement of Investment Policies and Procedures and regulatory requirements\nGLYPH<129> specifying the kinds of investments that can be held in the plans and monitoring compliance\nGLYPH<129> using asset allocation and diversification strategies, and\nGLYPH<129> purchasing annuities from time to time.\nThe funded pension plans are registered with the Office of the Superintendent of Financial Institutions and are subject to the Federal Pension Benefits Standards Act. The plans are also registered with the Canada Revenue Agency and are subject to the Canada Income Tax Act. The benefits provided under the plans and the contributions to the plans are funded and administered in accordance with all applicable legislation and regulations.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Title of each class\nName of each exchange on which registered\nCommon stock, without par value\nNew York Stock Exchange\nSecurities registered pursuant to Section 12(g) of the Act: None\nIndicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. YES NO Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. YES NO\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. YES NO\nIndicate by check mark whether the registrant has submitted electronically and posted on its corporate Website, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files). YES NO\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.\nIndicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of 'large accelerated filer,' 'accelerated filer' and 'smaller reporting company' in Rule 12b-2 of the Exchange Act.\nLarge accelerated filer\nAccelerated filer\nNon-accelerated filer (Do not check if a smaller reporting company)\nSmaller reporting company\nIndicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Act). YES NO\nAs of August 1, 2014 the aggregate market value of the Registrant's voting and non-voting stock held by non-affiliates of the Registrant was approximately $10.6 billion using the closing sales price on that day of $68.95. On March 2, 2015, 190,405,729 shares of common stock were outstanding.", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Consolidated Statements of Changes in Shareholders' Equity\nOther comprehensive income (loss):, Hedging.reserve. = . Other comprehensive income (loss):, Total.shareholders'.equity. = . Defined benefit pension plans, net of tax, Class A Voting shares..Amount. = -. Defined benefit pension plans, net of tax, Class A Voting shares.Number.of shares.(000s) = -. Defined benefit pension plans, net of tax, Class B Non-Voting shares..Amount. = -. Defined benefit pension plans, net of tax, Class B Non-Voting shares..Number of shares.(000s) = -. Defined benefit pension plans, net of tax, Share.premium. = -. Defined benefit pension plans, net of tax, Retained.earnings. = (173). Defined benefit pension plans, net of tax, Available- for-sale financial.assets.reserve. = -. Defined benefit pension plans, net of tax, Hedging.reserve. = -. Defined benefit pension plans, net of tax, Total.shareholders'.equity. = (173). Available-for-sale investments, net of tax, Class A Voting shares..Amount. = -. Available-for-sale investments, net of tax, Class A Voting shares.Number.of shares.(000s) = -. Available-for-sale investments, net of tax, Class B Non-Voting shares..Amount. = -. Available-for-sale investments, net of tax, Class B Non-Voting shares..Number of shares.(000s) = -. Available-for-sale investments, net of tax, Share.premium. = -. Available-for-sale investments, net of tax, Retained.earnings. = -. Available-for-sale investments, net of tax, Available- for-sale financial.assets.reserve. = (190). Available-for-sale investments, net of tax, Hedging.reserve. = -. Available-for-sale investments, net of tax, Total.shareholders'.equity. = (190). Derivative instruments, net of tax, Class A Voting shares..Amount. = -. Derivative instruments, net of tax, Class A Voting shares.Number.of shares.(000s) = -. Derivative instruments, net of tax, Class B Non-Voting shares..Amount. = -. Derivative instruments, net of tax,", - "page_start": 95, - "page_end": 95, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "(q) Recoverable Amount of Non-Current Assets\nNon-current assets are written down to recoverable amount where the carrying value of any non-current asset exceeds recoverable amount. In determining the recoverable amount of noncurrent assets, the expected net cash flows have not been discounted to their discount value.", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "First Financial Bankshares, Inc.\n(Exact Name of Registrant as Specified in Its Charter)\nTexas\n75-0944023\n(State or Other Jurisdiction of Incorporation or Organization)\n(I.R.S. Employer Identification No.)\n400 Pine Street Abilene, Texas\n79601\n(Address of Principal Executive Offices)\n(Zip Code)\nRegistrant's telephone number, including area code:\n(915) 627-7155\nSecurities registered pursuant to Section 12(b) of the Act:\nTitle of Class\nName of Exchange on Which Registered\nNone\nN/A\nSecurities registered pursuant to Section 12(g) of the Act:\nCommon Stock, par value $10.00 per share\nIndicate by check mark whether the registrant: (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.\nYes No\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Exchange Act Rule 12b-2).\nYes No\nAs of June 30, 2002, the last business day of the registrant's most recently completed second fiscal quarter, the aggregate market value of voting stock held by non-affiliates was $458,357,747.\nAs of February 25, 2003, there were 12 , 364 , 642 shares of Common Stock outstanding.", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Classification and recognition\nThe Group classifies its investments and other financial assets in the following categories: financial assets at fair value through profit or loss, loans and receivables and available-for-sale financial assets. The classification depends on the purpose for which the investments were acquired. The Group determines the classification of its investments at initial recognition and, in the case of assets classified as held-to-maturity, re-evaluates this designation at each reporting date.\nThe Group initially recognises loans and receivables and deposits on the date that they are originated. All other financial assets (including assets designated at fair value through profit or loss) are recognised initially on the trade date at\nwhich the Group becomes a party to the contractual provisions of the instrument.\nThe Group derecognises a financial asset when the contractual rights to the cash flows from the asset expire, or it transfers the rights to receive the contractual cash flows on the financial asset in a transaction in which substantially all the risks and rewards of ownership of the financial assets are transferred.\nFinancial assets and liabilities are offset and the net amount presented in the statement of financial position when, and only when, the Group has a legal right to offset the amounts and intends either to settle on a net basis or to realise the asset and settle the liability simultaneously.", - "page_start": 71, - "page_end": 72, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What metrics are good indicators of the coverage of gas molecules on carbon nanotubes ?", - "target_page": 1, - "target_passage": "the bind- ing energy and scattering resistance of the molecules", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nThe ability to detect small concentrations of specific chemical species is fundamental for a variety of industrial and scientific processes as well as for medical applications and environmental monitoring [1]. In general, nanostructured materials should be well suited for sensor applications because of their large surface to volume ratio which makes them sensitive to molecular adsorption. Specifically, carbon nanotubes (CNT) [2] have been shown to work remarkably well as detectors of small gas molecules. This has been demonstrated both for individual CNTs [3-8] as well as for CNT networks [9, 10].\nPristine CNTs are known to be chemically inert - a property closely related to their high stability. As a consequence, only radicals bind strong enough to the CNT to notably affect its electrical properties [2, 5, 11-13]. To make CNTs attractive for sensor applications thus requires some kind of functionalization, e.g. through doping or decoration of the CNT sidewall [13-21]. Ideally, this type of functionalization could be used to control not only the reactivity of the CNT but also the selectivity towards specific chemical species.\nIn this work we consider the possibility of using CNTs doped by 3d transition metal atoms for chemical gas sensing. We use computational screening to systematically identify the most promising dopant candidates for detection of three different target molecules (CO, NH3, H2S) under typical atmospheric conditions. The screening procedure is based on the calculation of two microscopic descriptors: the binding energy and scattering resistance of the molecules when adsorbed on a doped CNT. These two quantities give a good indication of the gas coverage and impact on the resistance. For the most promising candidates we then employ a simple thermodynamic model of the CNT sensor. In this model, the binding energies are used to obtain the fractional coverage of the metallic sites as a function of the target molecule concentration under ambient conditions. Under the assumption of transport in the diffusive rather than localization regime, the\nchange in CNT resistivity may then be obtained from the calculated coverages and single impurity conductances.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, 'Tailoring gas sensing properties of carbon nanotubes', J. Appl. Phys. 104 (2), 024502 (Jul. 2008), doi:10.1063/1.2956395.\n[9] C. Morgan, Z. Alemipour, and M. Baxendale, 'Variable range hopping in oxygen-exposed single-wall carbon nanotube networks', Phys. Stat. Solidi A 205 (6), 1394 (May 2008), doi:10.1002/pssa.200778113.\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, 'Influence of O2 and N2 on the conductivity of carbon nanotube networks', Phys. Rev. B 79 (19), 195431 (May 2009), doi:10.1103/PhysRevB.79.195431.\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, L. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, 'Role of defects on the gas sensing properties of carbon nanotubes thin films: experiment and theory', Chem. Phys. Lett. 387 (4-6), 356 (Apr. 2004), doi:10.1016/j.cplett.2004.02.038.\n[12] Z. Zanolli and J.-C. Charlier, 'Defective carbon nanotubes for single-molecule sensing', Phys. Rev. B 80 (15), 155447 (Oct. 2009), doi:10.1103/PhysRevB.80.155447.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nJ. M. Garc´ıa-Lastra 1,2 , ∗ D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 1 Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain 2 Center for Atomic-scale Materials Design, Department of Physics, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark 3 Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany\nWe use computational screening to systematically investigate the use of transition metal doped carbon nanotubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components of air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal atom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promising dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites in thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function of the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to Ni-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\nPACS numbers: 73.63.-b, 68.43.-h, 73.50.Lw", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n∗ Electronic address: juanmaria.garcia@ehu.es\n[1] Gas Sensing Materials, MRS Bull. , vol. 24 (1999).\n[2] J. C. Chalier, X. Blase, and S. Roche, 'Electronic and transport properties of nanotubes', Rev. Mod. Phys. 79 (2), 677 (May 2007), doi:10.1103/RevModPhys.79.677.\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, K. Cho, and H. Dai, 'Nanotube molecular wires as chemical sensors', Science 287 (5453), 622 (Jan. 2000), doi:10.1126/science.287.5453.622.\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, 'Extreme oxygen sensitivity of electronic properties of carbon nanotubes', Science 287 (5459), 1801 (Mar. 2000), doi:10.1126/science.287.5459.1801.\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, Integration and Applications (Wiley-VCH, Weinheim, 2008).\n[6] F. Villalpando-P'aez, A. H. Romero, E. Mu˜noz-Sandoval, L. M. Mart'ınez, H. Terrones, and M. Terrones, 'Fabrication of vapor and gas sensors using films of aligned CN x nanotubes', Chem. Phys. Lett. 386 (1-3), 137 (Mar. 2004), doi:10.1016/j.cplett.2004.01.052.\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R. da Silva, 'Designing real nanotube-based gas sensors', Phys. Rev. Lett. 100 (17), 176803 (May 2008), doi:10.1103/PhysRevLett.100.176803.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 2: Calculated (a) adsorption energy E ads in eV and (b) change in conductance ∆ G in units of G 0 = 2 e 2 /h for N2, O2, H2O, CO, NH3, and H2S on 3d transition metals occupying a monovacancy (top), divacancy I (middle), and divacancy II (bottom) in a (6,6) carbon nanotube.\nwhere E [ X @M@VC] is the total energy of molecule X on a transition metal atom occupying a vacancy, and E [ X ] is the gas phase energy of the molecule.\nFrom the adsorption energies plotted in Fig. 2(a), we see that the earlier transition metals tend to bind the adsorbates stronger than the late transition metals. The latest metals in the series (Cu and Zn) bind adsorbates rather weakly in the divacancy structures. We also note that O2 binds significantly stronger than any of the three target molecules on Ti, V, Cr, and Mn (except for Cr in divacancy I where H2S is found to dissociate). Active sites containing these metals are therefore expected to be completely passivated if oxygen is present in the background. Further, we find H2O is rather weakly bound to most of the active sites. This ensures that these types of sensors are robust against changes in humidity.\nIn thermodynamic equilibrium [27], the coverage of the active sites follows from\nΘ[ X ] = K [ X ] C [ X ] 1 + ∑ Y K [ Y ] C [ Y ] , (4)\nwhere K = k + /k -is the ratio of forward and backward rate constants for the adsorption reaction,\nK [ X ] = exp [ -E ads [ X ] + TS [ X ] k B T ] . (5)\nIn these expressions C [ X ] is the concentration of species X , S [ X ] is its gas phase entropy and T is the temperature. Experimental values for the gas phase entropies have been taken from Ref. [28].", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nIn summary, we have presented a general model of nanostructured chemical sensors which takes the adsorption energies of the relevant chemical species and their individual scattering resistances as the only input. On the basis of this model we have performed a computational screening of transition metal doped CNTs, and found that Ni-doped CNTs are promising candidates for detecting CO in a background of air. The model may be applied straightforwardly to other nanostructures than CNTs, other functionalizations than metal doping and other gas compositions than air.\nThe authors acknowledge financial support from Spanish MEC (FIS2007-65702-C02-01), 'Grupos Consolidados UPV/EHU del Gobierno Vasco' (IT-319-07), e-I3 ETSF project (Contract Number 211956), 'Red Espa˜nola de Supercomputaci'on', NABIIT and the Danish Center for Scientific Computing. The Center for Atomic-scale Materials Design (CAMD) is sponsored by the Lundbeck Foundation. JMG-L acknowledges funding from Spanish MICINN through Juan de la Cierva and Jos'e Castillejo programs.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[18] C. S. Yeung, L. V. Liu, and Y. A. Wang, 'Adsorption of small gas molecules onto Pt-doped single-walled carbon nanotubes', J. Phys. Chem. C 112 (19), 7401 (Apr. 2008), doi:10.1021/jp0753981.\n[19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, 'Structures, interactions, and ferromagnetism of Fe-carbon nanotube systems', J. Phys. Chem. C 112 (22), 400 (May 2008), doi:10.1021/jp0761968.\n[20] J. A. Furst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, ' Ab initio study of spin-dependent transport in carbon nanotubes with iron and vanadium adatoms', Phys. Rev. B 78 (19), 195405 (Nov. 2008), doi:10.1103/PhysRevB.78.195405.\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, P. Pyykko, and R. M. Nieminen, 'Embedding transitionmetal atoms in graphene: Structure, bonding, and magnetism', Phys. Rev. Lett. 102 (12), 126807 (Mar. 2009), doi:10.1103/PhysRevLett.102.126807.\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, 'Real-space grid implementation of the projector augmented wave method', Phys. Rev. B 71 (3), 035109 (Jan. 2005), doi:10.1103/PhysRevB.71.035109.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe find that oxidation of the active metal site passivates the sensor in the case of doping by Ti, V, Cr, and Mn under standard conditions (room temperature and 1 bar of pressure). Among the remaining metals, we identify Ni as is the most promising candidate for CO detection. For this system the change in resistance per active site is generally significant ( > 1 Ω ) for small changes in CO concentration in the relevant range of around 0.1-10 ppm. Our approach is quite general and is directly applicable to other nanostructures than CNTs, other functionalizations than metal doping, and other backgrounds than atmospheric air.\nAll total energy calculations and structure optimizations have been performed with the real-space density functional theory (DFT) code GPAW [22] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for representing the density and wave functions and the PBE exchange correlation functional [23]. Transport calculations for the optimized structures have been performed using the nonequilibrium Green's function method [24] with an electronic Hamiltonian obtained from the SIESTA code [25] in a double zeta polarized (DZP) basis set. Spin polarization has been taken into account in all calculations.\nMetallic doping of a (6,6) CNT has been modeled in a supercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A × 15 ˚ A × 14.622 ˚ A). For this size of supercell a Γ -point sampling of the Brillouin zone was found to be sufficient. The formation energy for creating a vacancy (VC) occupied by a transition metal atom (M) was calculated using the relation\nE form [ M @ VC ] = E [ M @ VC ] + nE [ C ] -E [ M@NT ] (1)\nwhere E [M@VC] is the total energy of a transition metal atom occupying a vacancy in the nanotube, n is the number of carbon atoms removed to form the vacancy, E [C] is the energy per carbon atom in a pristine nanotube, and E [M@NT]\n2", - "page_start": 0, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "Will U.S. natural gas prices reconnect with world natural gas prices?\ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it be compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL) natural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural gas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural gas is clean, affordable, abundant and American. Why shouldn't it trade at a BTU premium in the years ahead?\nNick Dell'Osso\nExecutive Vice President and Chief Financial Officer", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nTo estimate the effect of adsorbates on the electrical conductance of doped CNTs, we first consider the change in conductance when a single molecule is adsorbed on a metal site of an otherwise pristine CNT. In Fig. 2(b) we show the calculated change in conductance relative to the metal site with no adsorbate. In contrast to the binding energies, there are no clear trends in the conductances. The sensitivity of the conductance is perhaps most clearly demonstrated by the absence of correlation between different types of vacancies, i.e. between the three panels in Fig. 2(b). Close to the Fermi level, the conductance of a perfect armchair CNT equals 2 G 0 . The presence of the metal dopant leads to several dips in the transmission function known as Fano antiresonances [20]. The position and shape of these dips depend on the d -levels of the transition metal atom, the character of its bonding to the CNT, and is further affected by the presence of the adsorbate molecule. The coupling of all these factors is very complex and makes it difficult to estimate or rationalize the value of the conductance. For the spin polarized cases, we use the spin-averaged\n3\nconductances, i.e. G = ( G ↑ + G ↓ ) / 2.\nNext, we estimate the resistance of a CNT containing several impurities (a specific metal dopant with different molecular adsorbates). Under the assumption that the electron phasecoherence length, l φ , is smaller than the average distance between the dopants, d , we may neglect quantum interference and obtain the total resistance by adding the scattering resistances due to each impurity separately. The scattering resistance due to a single impurity is given by\nR s ( X ) = 1 /G ( X ) -1 / ( 2 G 0 ) , (6)\nwhere G ( X ) is the Landauer conductance of the pristine CNT with a single metal dopant occupied by molecule X and 1 / ( 2 G 0 ) is the contact resistance of a (6,6) CNT.\nWe may now obtain the total resistance per dopant site relative to the reference background signal as a function of the target molecule concentration", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "What is the source of inaccuracy of the MSA3 model at high ionic concentrations ?", - "target_page": 3, - "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nFIG. 2: (Color online) (a) Osmotic coefficient Φ in the McMillan-Mayer frame of reference. (diamond) MC simulations, (dot dashed) MSA2, (dot) Debye Huckel Limiting law (DHLL), (cross) experiments (Ref. [18] with the McMillanMayer to Lewis Randall conversion). (b) Minimization diameters. (dot dashed) MSA2 and (diamond) MSA-fit.\nWe first used LPT for a two-component system (Na + and Cl -free ions) within the MSA (model MSA2), for concentrations ranging from 0.1 to 2 . 0 mol l -1 . The minimization leads to almost constant diameters on the whole range of concentration: σ 1 = 3 . 67 ˚ A and σ 2 = 4 . 78 ˚ A. As shown in Fig. 2, these parameters yield osmotic coefficients close to MC calculations only at very low concentration, i.e., c ≤ 0 . 1 moll -1 (experimental values are given for indicative purposes only, since a perfect model will exactly match the MC results). For molar solutions, the LPT results differ considerably from MC calculations. This discrepancy can easily be understood by comparing the diameters found within the MSA2 calculation with the effective potentials given in Fig. 1. The anion/cation contact distance obtained within the MSA2 calculation is 4 . 2 ˚ A, which is in the region of the second minimum of the effective potential and corresponds to the situation where there is a single layer of water molecules between the ions. The first minimum of the potential, which corresponds to the contact ion pair (CIP) is thus completely ignored by the MSA2 calculation. If the MSA diameters are directly fitted to reproduce the MC osmotic pressure, much smaller values are obtained. These MSA-fit hydrated diameters, which are compared to the MSA2 diameters in the bottom part of Fig. 2, are averages of the CIP and the solvent-separated ion pair.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\n˜ ˜ Using these two reference systems, the threecomponent MSA3 and BIMSA3, we obtain results in much better agreement with the MC simulations, as shown in Fig. 4. The diameters obtained for species 1, 2, and 3 are 3.65, 4.79, and 5.76 ˚ A for MSA3 and 3.69, 4.75 and 6.19 ˚ A for BIMSA3. The free ion diameters are similar for MSA2, MSA3, and BIMSA3. The pair diameter is smaller when modeled as a hard sphere (MSA3) than when modeled as a dumbbell (BIMSA3). At high concentration (about 1 mol l -1 ), the MSA3 overestimates the free energy, because the excluded volume repulsion becomes too important for the pairs to be represented as hard spheres. The BIMSA3 model is the closest to the MC simulation results. It is worth noting that even at the lowest concentration considered, the fraction of pairs (shown in the insert of Fig. 4), although less then 5%, has a non-negligible effect on the thermodynamics of the system.\nThis procedure also provides an accurate description of the structure over the whole range of concentrations. A development similar to the one that leads to Eq. (2) derives the average unpaired RDF from the corresponding paired quantities:\nρ i ρ j g ij ( k ) = ˜ ρ 3 ˜ w ( k ) (1 -δ ij ) + ˜ ρ i ˜ ρ j ˜ g ij ( k ) + ˜ ρ 3 ˜ w ( k / 2) [ ˜ ρ i ˜ g 3 i + ˜ ρ j ˜ g 3 j ] ( k ) (5) + ˜ ρ 2 3 [ ˜ w ( k / 2)] 2 ˜ g 33 ( k )\nFIG. 5: (Color online) RDF obtained from MC simulations (diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) at two concentrations.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nof the BIMSA3 appears to be negligible compared to the reference term for concentrations less than 1 mol l -1 . The perturbation can then be omitted to obtain a fully analytical theory, determined by the hard sphere diameters and the pair fraction given by LPT; with the free energy and the RDF given in terms of the BIMSA and MSA solutions, as described above. While the procedure we have followed uses two different approximations for the reference and perturbation terms (MSA vs BIMSA), these are known to be accurate for the systems under consideration and do not appear to be inconsistent with each other.\nTo conclude, we have combined MD simulations with LPT to construct simple models of electrolyte solutions which account for the molecular nature of the solvent. The final result is fully analytical and it yields the thermodynamic and structural properties of the solution, in agreement with the original molecular description. The methodology can in principle be adapted to any molecular description of the system (MD simulations involving interaction potentials accounting for polarization effects or Car-Parrinello MD simulations for example) as long as the ion-ion RDF are known. It can also be generalized to study interfaces. The method appears to be a promising approach toward the description of the specific effects of ions, especially for complex systems whose modeling requires an analytic solution.\nThe authors are particularly grateful to Werner Kunz for fruitful discussions.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nK 0 = ∫ ∞ 0 d r 4 πr 2 e -β ˜ V int ( r ) = 0 . 43 L . mol -1 (3)\nThe excess free-energy density of the original system βf ex v is that of the three component mixture β ˜ f ex v plus a correction term\nβf ex v = β ˜ f ex v -˜ ρ 3 ln K 0 , (4)\nwhich is due to the change in standard chemical potential between the two component and three component models. It should be noted that the fraction of pairs is now an additional parameter in the minimization scheme, which serves to ensure chemical equilibrium. Within this representation, the pair can be modeled as a hard sphere (MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since\n3\nFIG. 4: (Color online) Excess free-energy density βf ex v as a function of the square root of the concentration √ c . (diamond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, (solid) BIMSA3, (dot) DHLL, and (cross) experiments. The inset gives the fraction of pairs (MSA3, BIMSA3) as a function of √ c .\nwe have no additional information, we consider only symmetric dumbbells. Furthermore, since analytic expressions for the RDF within BIMSA are not known, we approximate the dumbbell as a hard sphere when computing the perturbation term (this is not necessary for the reference term, since an expression for the free energy is available). Let ˜ σ c be the diameter of the cation (anion) within the dumbbell, the diameter of the hard sphere representing this dumbbell is taken to be σ 3 = 4 √ 2 π σ c [21].", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nAn alternative procedure consists in carrying out molecular simulations, where both the solvent and solute are treated explicitly. After a rigorous averaging over the solvent configurations, a coarse-grained description of the ions, which still includes the effect of the solvent structure, can be obtained [8-11]. However, this set of methods is purely numeric; they do not provide any analytical expression for thermodynamic quantities. They are therefore restricted to simple geometries [12, 13] (bulk solutions or planar interfaces). The description of complex systems, such as porous or electrochemical materials, is still based on continuous solvent models [14].\nIn this letter we present a method aimed at bridging the gap between analytical and numerical approaches. It is based on the application of liquid perturbation theory (LPT) [15] to effective ion-ion potentials extracted from\n∗ Electronic address: john.molina@etu.upmc.fr\n† Electronic address: jean-francois.dufreche@upmc.fr\nmolecular dynamics (MD) results. Different approximations of the PM are employed for the case of NaCl electrolyte solutions: a two component model (MSA2), that only takes free ions into account, and two different three component models (MSA3 and BIMSA3), which include a third species (the contact ion pair). As we proceed to show, LPT allows us to select the best simple model which accurately accounts for the thermodynamics and the physical-chemistry of the system.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe first stage consists in calculating the McMillanMayer effective ion-ion interaction potentials V eff ij ( r ), by inverting the radial distribution functions (RDF) g ij ( r ) obtained by MD. The simulations were carried out on a box of 2000 water molecules and 48 NaCl pairs using the same interaction potentials as in reference [16]. This setup corresponds to a concentration of 0 . 64 moll -1 . NPT ensemble sampling at standard pressure and temperature was enforced, with a time step of 1 fs and a pressure bath coupling constant of 1 ps. An equilibration run of 0.25 ns was followed by a production run of 0.6 ns for five different initial configurations. The averages of the resulting RDF were then used for the potential inversion via the HNC closure [15]. These effective potentials are assumed to be concentration independent and will be used for simulations at all concentrations.\nSubtracting the long-range Coulombic potential V LR ij ( r ) (which depends on the dielectric constant of the solvent) from V eff ij ( r ), we obtain the short-range contribution V SR ij ( r ) to the effective potentials. These are given in Fig. 1 (species 1 and 2 refer to Na + and Cl -free ions, respectively). All the short-range potentials exhibit oscillations corresponding to the solvent layering between the ions, but this effect is particularly important for the cation-anion interaction: a considerable potential barrier ( /greaterorsimilar 2 k B T ) separates the first two attractive wells. To serve as a reference, Monte Carlo (MC) simulations were performed with these effective potentials; a comparison between MD and MC RDF is also provided in Fig. 1. The excellent agreement between both sets of RDF validates the HNC inversion procedure [17], and allows us to com-\nFIG. 1: Effective McMillan-Mayer short-range pair potentials extracted from explicit solvent simulations using the HNC closure. (a) Cation anion, (b) cation cation, (c) anion anion, (d) cation anion RDF obtained from explicit solvent MD and implicit solvent MC simulations.\npute all ion thermodynamic properties through implicit solvent MC simulations.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nJohn Jairo Molina 1 , 2 , 3 , ∗ Jean-Fran¸cois Dufrˆeche 1 , 2 , 3 , † Mathieu Salanne 1 , 2 , Olivier Bernard 1 , 2 , Marie Jardat 1 , 2 , and Pierre Turq 1 , 2 1 UPMC-Universit'e Paris 06, UMR 7195, PECSA, F-75005 Paris, France 2 CNRS, UMR 7195, PECSA, F-75005 Paris, France 3 Institut de Chimie S'eparative de Marcoule (ICSM), UMR 5257 CEA-CNRS-Universit'e Montpellier 2, Site de Marcoule,\nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C'eze Cedex, France\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom descriptions; providing analytical expressions of the thermodynamic and structural properties of the ions consistent with the underlying explicit solvent representation. Effective potentials between ions in solution are calculated to perform perturbation theory calculations, in order to derive the best possible description in terms of charged hard spheres. Applying this method to NaCl solutions yields excellent agreement with the all-atom model, provided ion association is taken into account.\nSince the pioneering works of Debye, Huckel, and Onsager, electrolyte solutions have been commonly described by continuous solvent models, for which the McMillan-Mayer theory [1] provides a rigorous statistical-mechanical foundation. Within that level of description, simple phenomenological models such as the primitive model (PM), for which the ions are assimilated to charged hard spheres [2], can lead to explicit formulas for the thermodynamic and structural properties (e.g., with the help of the mean spherical approximation (MSA) [3] or the binding MSA (BIMSA) [4]). These models are the most practical to use [5], since they allow for a direct link between the experimental measurements and the microscopic parameters of the system. Nevertheless, they ignore the molecular structure of the solvent. Consequently, they cannot properly account for the complex specific effects of the ions, which appear in numerous biological, chemical, and physical interfacial phenomena [6, 7], without further developments.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "C. Marginal Fermi liquid model\nOn more careful looking we found the problem with the original MFLI model. We recall that in this model the self-energy in the SCS state was obtained by just cutting the NS self energy at ω 1 (see Eq.18). We argue that this phenomenological formalism is not fully consistent, at least for small α . Indeed, for α = 0, the MFLI model reduces to BCSI model for which the behavior of the selfenergy is given by Eq. (12). This self-energy evolves with ω and Σ '' has a square-root singularity at ω = ∆ + ω o (with ω o = 0). Meanwhile Σ '' in the original MFLI model in Eq. (18) simply jumps to zero at ω = ω 1 = ∆, and this happens for all values of α including α = 0 where the MFLI and BCSI model should merge. This inconsistency is reflected in Fig 13, where we plot the near-BCS limit of MFLI model by taking a very small α = 0 . 05. We see that the optical integral W K in the SCS still remains larger than in the NS over a wide range of Γ, in clear difference with the exactly known behavior in the BCSI\nFIG. 15: Top σ ( ω ) in the NS and the SCS in the 'corrected' MFLI model with the feedback from SC on the quasiparticle damping: i Γ term transforms into Γ √ -ω 2 +∆ 2 . In the SCS σ now begins at Ω = 2∆. The parameters are same as in Fig. 10. Bottom - the behavior of Kubo sum with Γ. Observe that W ( ω c ) in the NS is larger than in the SCS.\nFIG. 16: Evolution of the difference of the optical integrals between the SCS and the NS with the upper cut-off ω c for the 'corrected' MFLI model. Now ∆ W ( ω c ) is negative above some frequency. Parameters are same as in the Fig 15.\nmodel, where W K is larger in the NS for all Γ (see Fig. 4). In other words, the original MFLI model does not have the BCSI theory as its limiting case.", - "page_start": 8, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "(a) Global climate simulations at 1.5 ° Cand2 ° Cglobalwarming\nThe high-resolution simulations were performed using the HadGEM3A Global Atmosphere (GA) 3.0 model [12-14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with gridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of the HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of climate models [12]. This represents the third generation of HadGEM configurations, leading on from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. Key improvements over the previous model, HadGEM2, include increased vertical levels in the atmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. This version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met Office is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution for seasonal and decadal forecasting and clear benefits are emerging from this use at higher resolution [18,19].", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "5. Discussion\nSince they implement full approximate Bayesian inferences, AIF models are computationally more demanding than many approaches traditionally used in cognitive and agent-based modelling, in particular when the dimensionality of the generative model is large. This means that models with highly multidimensional or complex behaviour and large numbers of agents can be computationally infeasible to implement, especially given the additional computational demands introduced by fitting these models to empirical data. Avenues for addressing this implicit scaling problem were proposed in the context of machine learning applications [68,69], and with the use of simplifying assumptions-the use of which are ubiquitous in computational modelling-AIF has been used to model multi-agent phenomena, such as opinion dynamics [15,70], coordinated foraging [71] and fish school movements [12]. It remains to be explored how AIF models can be applied to highly complex natural phenomena, such as a concrete election, which underscores the need for efficient but flexible and accessible software tools in the field.\nThere are many ways in which ActiveInference can be improved. It would be useful to extend the set of dynamic belief states to include prediction errors since they are often used for model-based neuroscience. This would entail departing from discrete state-space (i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering or predictive coding (see below). An alternative would be to generate prediction errors from belief updating under discrete models, where prediction errors can be read as the (KL) divergence between posterior and prior beliefs (i.e., complexity or information gain). A simple interface could be added for creating custom parametrisations of the requisite parameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed to Dirichlet distributions. Parameter learning could be extended to all generative model parameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or temperature of the parameters that are learned); similarly for the precision over expected free energies γ . Preference priors should also be implementable for environmental states, in addition to observations, and A can be made action dependent.", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "In the health regulation regarding coronavirus, what is considered a \"device\" ?", - "target_page": 3, - "target_passage": "means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Power to use and disclose information\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the 'recipient') where it is necessary for the recipient to have the information -\n(a) for the purpose of carrying out a function of the recipient under-\n(i) these Regulations, or\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of requiring the isolation or quarantine of persons who have been outside the common travel area, for any of the purposes described in sub-paragraph (b);\n(b) for the purpose of-\n(i) preventing danger to public health as a result of the spread of infection or contamination with coronavirus or coronavirus disease,\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus disease, or\n(iii) giving effect to any international agreement or arrangement relating to the spread of infection or contamination with coronavirus or coronavirus disease; or\n29", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time period due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, the requirement for the local authority to review the making and use of direct payments within the first three months of them being made in regulation 11(2)(a) (monitoring and review of direct payments) is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n( a ) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.\n3\n(2) The coronavirus exception applies where it is not reasonably practicable for the local authority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the incidence or transmission of coronavirus.'.", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n(b) regulation 7(1) and (4) (responding to social care recommendations).'.\nVicky Ford Parliamentary Under Secretary of State Department for Education\n28th April 2020\n( a ) S.I. 2017/1306.\n5", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", - "page_start": 90, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014\n15. The Special Educational Needs (Personal Budgets) Regulations 2014( a ) are amended as follows.\n16. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n17. After regulation 2 (interpretation) insert-", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability Regulations 2014\n3. The Special Educational Needs and Disability Regulations 2014( c ) are amended as follows.\n4. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n5. After regulation 2 (interpretation) insert-", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n(d) regulation 19 (requirement to consider mediation);\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to pursue mediation);\n(f) regulation 21 (mediation);\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n(h) regulation 27(3) (steps to be taken by a home authority);\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n(j) regulation 30(3) and (6) (unopposed appeals).'.\n21. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n22. In regulation 5(4) (decision whether or not to conduct a detained person's EHC needs assessment)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n', or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n( a ) S.I. 2015/62.\n4", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Consequential Amendments\n1. -(1) The Health Protection (Notification) Regulations 2010( a ) are amended as follows.\n(2) In regulation 4(3D)(b), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n( a ) S.I. 2010/659. Regulations 4(3D) and 4ZA were inserted by S.I. 2021/150. There are other amendments but none is relevant.\n88", - "page_start": 87, - "page_end": 87, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "Regarding the regulation of Enforcement of requirement to self-isolate concerning travel and coronavirus, who are considered an \"authorised persons\" ?", - "target_page": 19, - "target_passage": "For the purposes of this regulation, “authorised person” means— (a) a constable; (b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or (c) a person designated by the Secretary of State for the purposes of this regulation.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "You should self-isolate again if:\nyou get symptoms of coronavirus (COVID-19) - get an NHS coronavirus (COVID-19) test from www.gov.uk/get-coronavirus-test and self-isolate until you get the results\nyou're going into hospital (self-isolating until the date you go in)\nsomeone you live with tests positive\n65\nyou have been traced as a contact of someone who tested positive\nFor advice on when you might need to self-isolate and what to do, go to www.nhs.uk/conditions/coronavirus-covid-19 and read 'Self-isolation and treating symptoms'.", - "page_start": 64, - "page_end": 65, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time period due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, the requirement for the local authority to review the making and use of direct payments within the first three months of them being made in regulation 11(2)(a) (monitoring and review of direct payments) is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n( a ) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.\n3\n(2) The coronavirus exception applies where it is not reasonably practicable for the local authority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the incidence or transmission of coronavirus.'.", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Form A: negative test result\nYour coronavirus test result is negative. You did not have the virus when the test was done. If you are self-isolating as an international arrival from an amber-list country, region or territory you may stop self-isolating.\nYou should self-isolate if:\nyou get symptoms of coronavirus (you should get an NHS coronavirus test and self-isolate until you get the results)\nyou are going into hospital (self-isolating until the date you go in)\nsomeone you live with tests positive\nyou have been traced as a contact of someone who tested positive\nFor advice on when you might need to self-isolate and what to do, go to www.nhs.uk/conditions/coronavirus-covid-19 and read 'Self-isolation and treating symptoms'.\nIt is a legal requirement to self-isolate when you arrive in the UK from an amber-list country, territory or region. If you are contacted by the enforcement authorities or the police after you have received this negative result please show them this notification.\n72", - "page_start": 71, - "page_end": 71, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Power to use and disclose information\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the 'recipient') where it is necessary for the recipient to have the information -\n(a) for the purpose of carrying out a function of the recipient under-\n(i) these Regulations, or\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of requiring the isolation or quarantine of persons who have been outside the common travel area, for any of the purposes described in sub-paragraph (b);\n(b) for the purpose of-\n(i) preventing danger to public health as a result of the spread of infection or contamination with coronavirus or coronavirus disease,\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus disease, or\n(iii) giving effect to any international agreement or arrangement relating to the spread of infection or contamination with coronavirus or coronavirus disease; or\n29", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", - "page_start": 90, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n(b) regulation 7(1) and (4) (responding to social care recommendations).'.\nVicky Ford Parliamentary Under Secretary of State Department for Education\n28th April 2020\n( a ) S.I. 2017/1306.\n5", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Form B: positive test result\nYour coronavirus test result is positive. You had the virus when the test was done.\nIf you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day after your test date. If you have symptoms of coronavirus, you must self-isolate for 10 days from the day your symptoms started, if earlier than when you took your test.\nPeople you live with or are travelling with should also self-isolate for 10 days from the day after you took the test.\nYou may be contacted for contact tracing and to check that you, and those who you live or are travelling with, are self-isolating.\nYou must not travel, including to leave the UK, during self-isolation.\nContact 111 if you need medical help. In an emergency dial 999.", - "page_start": 72, - "page_end": 72, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Relevant websites\n1. The following are 'the relevant websites' for the purposes of regulation 14-\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-ukborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-inengland\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england\nhttp://www.gov.uk/travel-quarantine-and-testing\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england\n83\nhttps://www.gov.uk/provide-journey-contact-details-before-travel-uk\nhttps://www.gov.uk/uk-border-control\nhttps://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-advice\nhttps://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/\nhttps://gov.wales/arriving-wales-overseas", - "page_start": 82, - "page_end": 83, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "What is the expiracy date of the regulation regarding travel during the coronavirus pandemic made in 2021 ?", - "target_page": 31, - "target_passage": "These Regulations expire at the end of 16th May 2022.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", - "page_start": 90, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Power to use and disclose information\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the 'recipient') where it is necessary for the recipient to have the information -\n(a) for the purpose of carrying out a function of the recipient under-\n(i) these Regulations, or\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of requiring the isolation or quarantine of persons who have been outside the common travel area, for any of the purposes described in sub-paragraph (b);\n(b) for the purpose of-\n(i) preventing danger to public health as a result of the spread of infection or contamination with coronavirus or coronavirus disease,\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus disease, or\n(iii) giving effect to any international agreement or arrangement relating to the spread of infection or contamination with coronavirus or coronavirus disease; or\n29", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time period due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, the requirement for the local authority to review the making and use of direct payments within the first three months of them being made in regulation 11(2)(a) (monitoring and review of direct payments) is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n( a ) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.\n3\n(2) The coronavirus exception applies where it is not reasonably practicable for the local authority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the incidence or transmission of coronavirus.'.", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n(b) regulation 7(1) and (4) (responding to social care recommendations).'.\nVicky Ford Parliamentary Under Secretary of State Department for Education\n28th April 2020\n( a ) S.I. 2017/1306.\n5", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Revocations, transitional provision consequential amendments and savings\n26. -(1) The following Regulations are revoked-\n(a) the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020( a );\n(b) the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations')( b ); and\n(c) the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021( c ).\n(2) Schedule 15 makes consequential amendments to other instruments specified in that Schedule.\n(3) Schedule 16 makes transitional provisions.\n(4) Nothing in these Regulations applies in relation to a person who arrived in England before 4.00 a.m. on 17th May 2021 (and accordingly, the regulations mentioned in paragraph (1) continue to have effect in relation to such a person).\nSigned by authority of the Secretary of State\nAt 10.32 a.m. on 14th May 2021\n( a ) S.I. 2020/567.\n( b ) S.I. 2020/568.\n( c ) S.I. 2021/38.\nRobert Courts Parliamentary Under Secretary of State Department for Transport\n31\nAustralia\nBrunei\nFalkland Islands\nFaroe Islands\nGibraltar\nIceland\nIsrael\nNew Zealand\nPortugal, including the Azores and Madeira\nSaint Helena, Ascension and Tristan da Cunha\nSingapore\nSouth Georgia and the South Sandwich Islands", - "page_start": 30, - "page_end": 31, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability Regulations 2014\n3. The Special Educational Needs and Disability Regulations 2014( c ) are amended as follows.\n4. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n5. After regulation 2 (interpretation) insert-", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "PUBLIC HEALTH, ENGLAND\nThe Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021\nMade\n-\n-\n-\n-\nat 10.32 a.m. on 14th May 2021\nLaid before Parliament\nat 2.30 p.m. on 14th May 2021\nComing into force\n- -\nat 4.00 a.m. on 17th May 2021", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014\n15. The Special Educational Needs (Personal Budgets) Regulations 2014( a ) are amended as follows.\n16. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n17. After regulation 2 (interpretation) insert-", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "Who first suggested the notions of \"hard\" and \"easy\" problems regarding consciousness ?", - "target_page": 1, - "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Consciousness\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \"easy\" problems of consciousness. [381] The easy problem is understanding how the brain processes signals, makes plans and controls behavior. The hard problem is explaining how this feels or why it should feel like anything at all, assuming we are right in thinking that it truly does feel like something (Dennett's consciousness illusionism says this is an illusion). While human information processing is easy to explain, human subjective experience is difficult to explain. For example, it is easy to imagine a colorblind person who has learned to identify which objects in their field of view are red, but it is not clear what would be required for the person to know what red looks like . [382]", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Hard problem of consciousness\nIn the philosophy of mind, the hard problem of consciousness is to explain why and how humans and other organisms have qualia, phenomenal consciousness, or subjective experience. [1][2] It is contrasted with the \"easy problems\" of explaining why and how physical systems give a (healthy) human being the ability to discriminate, to integrate information, and to perform behavioral functions such as watching, listening, speaking (including generating an utterance that appears to refer to personal behaviour or belief), and so forth. [1] The easy problems are amenable to functional explanation-that is, explanations that are mechanistic or behavioral-since each physical system can be explained (at least in principle) purely by reference to the \"structure and dynamics\" that underpin the phenomenon. [1][3]\nProponents of the hard problem argue that it is categorically different from the easy problems since no mechanistic or behavioral explanation could explain the character of an experience, not even in principle. Even after all the relevant functional facts are explicated, they argue, there will still remain a further question: \"why is the performance of these functions accompanied by experience?\" [1] To bolster their case, proponents of the hard problem frequently turn to various philosophical thought experiments, involving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed ineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such as the experience of being a bat.\nThe terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers in a 1994 talk given at The Science of Consciousness conference held in Tucson, Arizona. [4] The following year, the main talking points of Chalmers' talk were published in The Journal of Consciousness Studies . [1] The publication gained significant attention from consciousness researchers and became the subject of a special volume of the journal, [5][6] which was later published into a book. [7] In 1996, Chalmers published The Conscious Mind , a book-length treatment of the hard problem, in which he elaborated on his core arguments and responded to counterarguments. His use of the word easy is \"tongue-in-cheek\". [8] As the\nChalmers on stage for an Alan Turing Year event at De La Salle University, Manila, 27 March 2012", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Neural correlates of consciousness\nSince 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof Koch have made significant progress toward identifying which neurobiological events occur concurrently to the experience of subjective consciousness. [131] These postulated events are referred to as neural correlates of consciousness or NCCs. However, this research arguably addresses the question of which neurobiological mechanisms are linked to consciousness but not the question of why they should give rise to consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In \"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting the principle that something such as what he terms \"global availability\" can be used as an indicator of consciousness, the neural correlates will be discovered \"in a century or two\". [132] Nevertheless, he stated regarding their relationship to the hard problem of consciousness:\nOne can always ask why these processes of availability should give rise to consciousness in the first place. As yet we cannot explain why they do so, and it may well be that full details about the processes of availability will still fail to answer this question. Certainly, nothing in the standard methodology I have outlined answers the question; that methodology assumes a relation between availability and consciousness, and therefore does nothing to explain it. [...] So the hard problem remains. But who knows: Somewhere along the line we may be led to the relevant insights that show why the link is there, and the hard problem may then be solved. [132]\nThe neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard problem, but rather one of the so-called easy problems to which the hard problem is contrasted. [133] Kandel went on to note Crick and Koch's suggestion that once the binding problem-understanding what accounts for the unity of experience-is solved, it will be possible to solve the hard problem empirically. [133] However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is a distraction from what he calls the \"real problem\": understanding the neurobiology underlying", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Meta-problem\nIn 2018, Chalmers highlighted what he calls the \" meta-problem of consciousness \", another problem related to the hard problem of consciousness: [76]\nThe meta-problem of consciousness is (to a first approximation) the problem of explaining why we think that there is a [hard] problem of consciousness.\nIn his \"second approximation\", he says it is the problem of explaining the behavior of \"phenomenal reports\", and the behavior of expressing a belief that there is a hard problem of consciousness. [76]\nExplaining its significance, he says: [76]\nAlthough the meta-problem is strictly speaking an easy problem, it is deeply connected to the hard problem. We can reasonably hope that a solution to the meta-problem will shed significant light on the hard problem. A particularly strong line holds that a solution to the\nmeta-problem will solve or dissolve the hard problem. A weaker line holds that it will not remove the hard problem, but it will constrain the form of a solution.\nIn other words, the 'strong line' holds that the solution to the meta-problem would provide an explanation of our beliefs about consciousness that is independent of consciousness. That would debunk our beliefs about consciousness, in the same way that explaining beliefs about god in evolutionary terms may provide arguments against theism itself. [144]", - "page_start": 16, - "page_end": 17, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Strong reductionism\nMany philosophers have disputed that there is a hard problem of consciousness distinct from what Chalmers calls the easy problems of consciousness. Some among them, who are sometimes termed strong reductionists , hold that phenomenal consciousness (i.e., conscious experience) does exist but that it can be fully understood as reducible to the brain. [43]\nBroadly, strong reductionists accept that conscious experience is real but argue it can be fully understood in functional terms as an emergent property of the material brain. [43] In contrast to weak reductionists (see above), strong reductionists reject ideas used to support the existence of a hard problem (that the same functional organization could exist without consciousness, or that a blind person who understood vision through a textbook would not know everything about sight) as simply mistaken intuitions. [43][52]\nA notable family of strong reductionist accounts are the higher-order theories of consciousness. [62][43] In 2005, the philosopher Peter Carruthers wrote about \"recognitional concepts of experience\", that is, \"a capacity to recognize [a] type of experience when it occurs in one's own mental life,\" and suggested that such a capacity could explain phenomenal consciousness without positing qualia. [63] On the higher-order view, since consciousness is a representation, and representation is fully functionally analyzable, there is no hard problem of consciousness. [43]\nThe philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the existence of a hard problem-philosophical zombies, Mary's room, and Nagel's bats-are only persuasive if one already assumes that \"consciousness must be independent of the structure and function of mental states, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that \"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we should let our theories of consciousness guide our conclusions from the thought experiments.\" [64]", - "page_start": 6, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Strong reductionism\nThe philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a \"category mistake\". [17] He said: \"Of course an explanation isn't the same as an experience, but that's because the two are completely independent categories, like colors and triangles. It is obvious that I cannot experience what it is like to be you, but I can potentially have a complete explanation of how and why it is possible to be you.\" [17]\nIn 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of consciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted that Dewey's approach would see the hard problem as the consequence of an unjustified assumption that feelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the 'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a philosophical mistake : the mistake of failing to see that the physical can be had as an episode of immediate sentiency.\" [65]\nThe philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly widespread view in biology which was not so much solved as abandoned. [66] Brian Jonathan Garrett has also argued that the hard problem suffers from flaws analogous to those of vitalism. [67]", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Eliminative materialism / Illusionism\nThe philosopher Daniel Dennett is another prominent figure associated with illusionism. After Frankish published a paper in the Journal of Consciousness Studies titled Illusionism as a Theory of Consciousness, [60] Dennett responded with his own paper with the spin-off title Illusionism as the Obvious Default Theory of Consciousness. [61] Dennett has been arguing for the illusory status of consciousness since early on in his career. For example, in 1979 he published a paper titled On the Absence of Phenomenology (where he argues for the nonexistence of phenomenal consciousness). [70] Similar ideas have been explicated in his 1991 book Consciousness Explained. [71] Dennett argues that the so-called \"hard problem\" will be solved in the process of solving what Chalmers terms the \"easy problems\". [16] He compares consciousness to stage magic and its capability to create extraordinary illusions out of ordinary things. [72] To show how people might be commonly fooled into overstating the accuracy of their introspective abilities, he describes a phenomenon called change blindness, a visual process that involves failure to detect scenery changes in a series of alternating images. [73] He accordingly argues that consciousness need not be what it seems to be based on introspection. To address the question of the hard problem, or how and why physical processes give rise to experience, Dennett states that the phenomenon of having experience is nothing more than the performance of functions or the production of behavior, which can also be referred to as the easy problems of consciousness. [16] Thus, Dennett argues that the hard problem of experience is included among-not separate from-the easy problems, and therefore they can only be explained together as a cohesive unit. [72]", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Strong reductionism\nThe philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness can emerge from matter, whereas in fact sentience emerges from the evolution of living organisms. [68] He states: \"The hard problem isn't a hard problem at all. The really hard problems are the problems the scientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion in the conceptual scheme.\" [68] Hacker's critique extends beyond Chalmers and the hard problem, being directed against contemporary philosophy of mind and neuroscience more broadly. Along with the neuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly dualistic in its conceptualizations and is predicated on the mereological fallacy of ascribing psychological concepts to the brain that can properly be ascribed only to the person as a whole. [69] Hacker further states that \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception of consciousness which they have is incoherent\". [68]", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Integrated information theory\nIntegrated information theory (IIT), developed by the neuroscientist and psychiatrist Giulio Tononi in 2004 and more recently also advocated by Koch, is one of the most discussed models of consciousness in neuroscience and elsewhere. [135][136] The theory proposes an identity between consciousness and integrated information, with the latter item (denoted as Φ) defined mathematically and thus in principle measurable. [136][137] The hard problem of consciousness, write Tononi and Koch, may indeed be intractable when working from matter to consciousness. [15] However, because IIT inverts this relationship and works from phenomenological axioms to matter, they say it could be able to solve the hard problem. [15] In this vein, proponents have said the theory goes beyond identifying human neural correlates and can be extrapolated to all physical systems. Tononi wrote (along with two colleagues):\nWhile identifying the \"neural correlates of consciousness\" is undoubtedly important, it is hard to see how it could ever lead to a satisfactory explanation of what consciousness is and how it comes about. As will be illustrated below, IIT offers a way to analyze systems of mechanisms to determine if they are properly structured to give rise to consciousness, how much of it, and of which kind. [138]\nAs part of a broader critique of IIT, Michael Cerullo suggested that the theory's proposed explanation is in fact for what he dubs (following Scott Aaronson) the \"Pretty Hard Problem\" of methodically inferring which physical systems are conscious-but would not solve Chalmers' hard problem. [136] \"Even if IIT is correct,\" he argues, \"it does not explain why integrated information generates (or is) consciousness.\" [136] Chalmers agrees that IIT, if correct, would solve the \"Pretty Hard Problem\" rather than the hard problem. [139]", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Overview\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the problem of consciousness\" (1995) [1] and expanded upon it in The Conscious Mind (1996). His works provoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers for his argumentative rigour and \"impeccable clarity\". [27] Pinker later said, in 2018, \"In the end I still think that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a meaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether the same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with several other philosophers that it may be futile to hope for a solution at all, precisely because it is a conceptual problem, or, more accurately, a problem with our concepts.\" [28] Daniel Dennett and Patricia Churchland, among others, believe that the hard problem is best seen as a collection of easy problems that will be solved through further analysis of the brain and behaviour. [29][30]\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of being awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \" the feeling of what it is like to be something.\" Consciousness, in this sense, is synonymous with experience. [31][27]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "What is David Chalmer's definition of \"consciousness\" ?", - "target_page": 2, - "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Neural correlates of consciousness\nconsciousness, namely the neural correlates of various conscious processes. [22] This more modest goal is the focus of most scientists working on consciousness. [133] Psychologist Susan Blackmore believes, by contrast, that the search for the neural correlates of consciousness is futile and itself predicated on an erroneous belief in the hard problem of consciousness. [134]", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" - }, - { - "text": "References\n95. Chalmers, David (2006). \"Phenomenal Concepts and the Explanatory Gap\" (http://consc.ne t/papers/pceg.pdf) (PDF). In Alter, Torin; Walter, Sven (eds.). Phenomenal Concepts and Phenomenal Knowledge: New Essays on Consciousness and Physicalism . Oxford University Press. ISBN 9780195171655. Retrieved 27 March 2019.\n96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on David Chalmers\". Journal of Consciousness Studies . 26 (9-10): 257-269.\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of Consciousness\". Journal of Consciousness Studies . 26 (9-10): 136-147.\n98. \"Is the hard problem of consciousness really that hard? | Brian Greene and Pat Churchland lock horns\" (https://www.youtube.com/watch?v=hru5d_wsu7g). YouTube . 9 July 2022.\n99. \"Abiogenesis\" (https://www.allaboutscience.org/abiogenesis.htm).\n100. Ignorance and Imagination: The Epistemic Origin of the Problem of Consciousness. Daniel Stoljar. Oxford University Press.\n101. \"Notes on consciousness. (X) Why I am not a panpsychist - Reading notes on Philip Goff's \"Galileo's error\" \" (http://romainbrette.fr/notes-on-consciousness-x-why-i-am-not-a-panpsychi st-reading-notes-on-philip-goffs-galileos-error/). 25 January 2022.\n102. Jan 14, 2014. \"Consciousness\". Sections 2.1 and 3. Stanford Encyclopedia of Philosophy. https://plato.stanford.edu/entries/consciousness/\n103. May 13, 2022. \"Panpsychism\". Section 4.4.2. Stanford Encyclopedia of Philosophy. https://plato.stanford.edu/entries/panpsychism/", - "page_start": 23, - "page_end": 24, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Overview\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the problem of consciousness\" (1995) [1] and expanded upon it in The Conscious Mind (1996). His works provoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers for his argumentative rigour and \"impeccable clarity\". [27] Pinker later said, in 2018, \"In the end I still think that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a meaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether the same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with several other philosophers that it may be futile to hope for a solution at all, precisely because it is a conceptual problem, or, more accurately, a problem with our concepts.\" [28] Daniel Dennett and Patricia Churchland, among others, believe that the hard problem is best seen as a collection of easy problems that will be solved through further analysis of the brain and behaviour. [29][30]\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of being awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \" the feeling of what it is like to be something.\" Consciousness, in this sense, is synonymous with experience. [31][27]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" - }, - { - "text": "References\n1. Chalmers, David (1995). \"Facing up to the problem of consciousness\" (http://consc.net/pape rs/facing.pdf) (PDF). Journal of Consciousness Studies . 2 (3): 200-219.\n2. Harnad, Stevan (1995). \"Why and how we are not zombies\" (http://cogprints.org/1601/6/har nad95.zombies.html). Journal of Consciousness Studies . 1 : 164-167. See also Harnad, Stevan (April 2000). \"How/why the mind-body problem is hard\" (http://cogprints.org/1617/1/ harnad00.mind.humphrey.html). Journal of Consciousness Studies . 7 (4): 54-61.\n3. See Cooney's foreword to the reprint of Chalmers' paper: Brian Cooney, ed. (1999). \"Chapter 27: Facing up to the problem of consciousness\". The place of mind . Cengage Learning. pp. 382 ff . ISBN 978-0534528256.\n4. Problem of Consciousness (Tuscan 1994) (https://www.youtube.com/watch?v=_lWp-6hH_6 g%7CHard)\n5. JCS vol. 4, pp. 3-46, 1997\n6. Chalmers, David (1997). \"Moving forward on the problem of consciousness\". Journal of Consciousness Studies . 4 (1): 3-46.\n7. Shear, Jonathan (1997). Explaining Consciousness: The Hard Problem . MIT Press. ISBN 978-0262692212.\n8. \"Episode 83, The David Chalmers Interview (Part I - Consciousness)\" (https://thepanpsycas t.com/panpsycast2/episode83-1). The Panpsycast Philosophy Podcast . 19 July 2020. Retrieved 2020-09-05.\n9. Pinker, Steven (29 January 2007). \"The Brain: The Mystery of Consciousness\" (http://conten t.time.com/time/magazine/article/0,9171,1580394-1,00.html). Time . Retrieved 19 December 2018.", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Idealism and cosmopsychism\nA traditional solution to the hard problem is idealism, according to which consciousness is fundamental and not simply an emergent property of matter. It is claimed that this avoids the hard problem entirely. [120] Objective idealism and cosmopsychism consider mind or consciousness to be the fundamental substance of the universe. Proponents claim that this approach is immune to both the hard problem of consciousness and the combination problem that affects panpsychism. [121][122][123]\nFrom an idealist perspective, matter is a representation or image of mental processes. Supporters suggest that this avoids the problems associated with the materialist view of mind as an emergent property of a physical brain. [124] Critics argue that this then leads to a decombination problem: how is it possible to split a single, universal conscious experience into multiple, distinct conscious experiences? In response, Bernardo Kastrup claims that nature hints at a mechanism for this in the condition dissociative identity disorder (previously known as Multiple Personality Disorder). [125] Kastrup proposes dissociation as an example from nature showing that multiple minds with their own individual subjective experience could develop within a single universal mind.\nCognitive psychologist Donald D. Hoffman uses a mathematical model based around conscious agents, within a fundamentally conscious universe, to support conscious realism as a description of nature-one that falls within the objective idealism approaches to the hard problem: \"The objective world, i.e., the world whose existence does not depend on the perceptions of a particular conscious agent, consists entirely of conscious agents.\" [126]\nDavid Chalmers calls this form of idealism one of \"the handful of promising approaches to the mindbody problem.\" [127]", - "page_start": 12, - "page_end": 13, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The \"soft-wired view\"\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to contemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that the psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned. Notable researchers who hold this view include Anna Wierzbicka, [96] Hakwan Lau and Matthias Michel. [97]\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including words like experience and consciousness ) are not universally translatable, and are \"parochially English.\" [96] Weirzbicka calls David Chalmers out by name for using these words, arguing that if\nphilosophers \"were to use panhuman concepts expressed in crosstranslatable words\" (such as know , think , or feel ) then the hard problem would dissolve. [96] David Chalmers has responded to these criticisms by saying that he will not \"apologize for using technical terms in an academic article . . . they play a key role in efficient communication in every discipline, including Wierzbicka's\". [89]", - "page_start": 10, - "page_end": 11, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Eliminative materialism / Illusionism\nEliminativists differ on the role they believe intuitive judgement plays in creating the apparent reality of consciousness. The philosopher Jacy Reese Anthis is of the position that this issue is born of an overreliance on intuition, calling philosophical discussions on the topic of consciousness a form of \"intuition jousting\". [74] But when the issue is tackled with \"formal argumentation\" and \"precise semantics\" then the hard problem will dissolve. [74] The philosopher Elizabeth Irvine, in contrast, can be read as having the opposite view, since she argues that phenomenal properties (that is, properties of consciousness) do not exist in our common-sense view of the world. She states that \"the hard problem of consciousness may not be a genuine problem for non-philosophers (despite its overwhelming obviousness to philosophers).\" [75]\nA complete illusionist theory of consciousness must include the description of a mechanism by which the illusion of subjective experience is had and reported by people. Various philosophers and scientists have proposed possible theories. [76] For example, in his book Consciousness and the Social Brain neuroscientist Michael Graziano advocates what he calls attention schema theory, in which our perception\nof being conscious is merely an error in perception, held by brains which evolved to hold erroneous and incomplete models of their own internal workings, just as they hold erroneous and incomplete models of their own bodies and of the external world. [77][78]", - "page_start": 8, - "page_end": 9, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Commentary on the problem's explanatory targets\nPhilosopher Raamy Majeed argued in 2016 that the hard problem is associated with two \"explanatory targets\": [54]\n1. [PQ] Physical processing gives rise to experiences with a phenomenal character.\n2. [Q] Our phenomenal qualities are thus-and-so.\nThe first fact concerns the relationship between the physical and the phenomenal (i.e., how and why are some physical states felt states), whereas the second concerns the very nature of the phenomenal itself (i.e., what does the felt state feel like?).\nWolfgang Fasching argues that the hard problem is not about qualia, but about the what-it-is-like-ness of experience in Nagel's sense-about the givenness of phenomenal contents:\nToday there is a strong tendency to simply equate consciousness with the qualia. Yet there is clearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of pain\" are qualities we are conscious of . So philosophy of mind tends to treat consciousness as if it consisted simply of the contents of consciousness (the phenomenal qualities), while it really is precisely consciousness of contents, the very givenness of whatever is subjectively given. And therefore the problem of consciousness does not pertain so much to some alleged \"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective subject, but rather to the nature of \"seeing\" itself (and in today's philosophy of mind astonishingly little is said about the latter). [129]", - "page_start": 13, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Neural correlates of consciousness\nSince 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof Koch have made significant progress toward identifying which neurobiological events occur concurrently to the experience of subjective consciousness. [131] These postulated events are referred to as neural correlates of consciousness or NCCs. However, this research arguably addresses the question of which neurobiological mechanisms are linked to consciousness but not the question of why they should give rise to consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In \"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting the principle that something such as what he terms \"global availability\" can be used as an indicator of consciousness, the neural correlates will be discovered \"in a century or two\". [132] Nevertheless, he stated regarding their relationship to the hard problem of consciousness:\nOne can always ask why these processes of availability should give rise to consciousness in the first place. As yet we cannot explain why they do so, and it may well be that full details about the processes of availability will still fail to answer this question. Certainly, nothing in the standard methodology I have outlined answers the question; that methodology assumes a relation between availability and consciousness, and therefore does nothing to explain it. [...] So the hard problem remains. But who knows: Somewhere along the line we may be led to the relevant insights that show why the link is there, and the hard problem may then be solved. [132]\nThe neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard problem, but rather one of the so-called easy problems to which the hard problem is contrasted. [133] Kandel went on to note Crick and Koch's suggestion that once the binding problem-understanding what accounts for the unity of experience-is solved, it will be possible to solve the hard problem empirically. [133] However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is a distraction from what he calls the \"real problem\": understanding the neurobiology underlying", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Explanatory gap\nIn 1983, the philosopher Joseph Levine proposed that there is an explanatory gap between our understanding of the physical world and our understanding of consciousness. [42]\nLevine's disputes that conscious states are reducible to neuronal or brain states. He uses the example of pain (as an example of a conscious state) and its reduction to the firing of c-fibers (a kind of nerve cell). The difficulty is as follows: even if consciousness is physical, it is not clear which physical states correspond to which conscious states. The bridges between the two levels of description will be contingent, rather than necessary. This is significant because in most contexts, relating two scientific levels of descriptions (such as physics and chemistry) is done with the assurance of necessary connections between the two theories (for example, chemistry follows with necessity from physics). [43]\nLevine illustrates this with a thought experiment: Suppose that humanity were to encounter an alien species, and suppose it is known that the aliens do not have any c-fibers. Even if one knows this, it is not obvious that the aliens do not feel pain: that would remain an open question. This is because the fact that aliens do not have c-fibers does not entail that they do not feel pain (in other words, feelings of pain do not follow with logical necessity from the firing of c-fibers). Levine thinks such thought experiments demonstrate an explanatory gap between consciousness and the physical world: even if consciousness is reducible to physical things, consciousness cannot be explained in terms of physical things, because the link between physical things and consciousness is a contingent link. [43]\nLevine does not think that the explanatory gap means that consciousness is not physical; he is open to the idea that the explanatory gap is only an epistemological problem for physicalism. [43] In contrast, Chalmers thinks that the hard problem of consciousness does show that consciousness is not physical. [27]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "What is the role of the PhilPapers organization ?", - "target_page": 6, - "target_passage": " PhilPapers is an organization that archives academic philosophy papers and periodically surveys professional philosophers about their views.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "References\n54. Majeed, Raamy (September 2016). \"The hard problem & its explanatory targets\". Ratio . 29 (3): 298-311. doi:10.1111/rati.12103 (https://doi.org/10.1111%2Frati.12103).\n55. Levin, Janet (2008). \"Taking Type-B Materialism Seriously\" (https://philpapers.org/rec/LEVT TM). Mind and Language . 23 (4): 402-425. doi:10.1111/j.1468-0017.2008.00349.x (https://d oi.org/10.1111%2Fj.1468-0017.2008.00349.x).\n56. Mandik, Pete; Weisberg, Josh (2008). Wrenn, Chase (ed.). Type-Q Materialism (https://philp apers.org/rec/MANTM). Peter Lang Publishing Group.\n57. Pereira, Roberto Horácio Sá (2016). \"In Defence of Type-A Materialism\" (https://philpapers.o rg/rec/PERIDO-3). Diametros . 49 (49): 68-83. doi:10.13153/diam.49.2016.921 (https://doi.or g/10.13153%2Fdiam.49.2016.921).\n58. Yetter-Chappell, Helen (2017). \"Dissolving Type-B Physicalism\" (https://philpapers.org/rec/Y ETDTP-2). Philosophical Perspectives . 31 (1): 469-498. doi:10.1111/phpe.12099 (https://do i.org/10.1111%2Fphpe.12099).\n59. Ramsey, William (2019). \"Eliminative Materialism\" (https://plato.stanford.edu/entries/material ism-eliminative/). In Zalta, Edward N. (ed.). Stanford Encyclopedia of Philosophy . Retrieved 1 April 2019.", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Bibliography\nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\". Philosophy Compass . 10 (5): 301-309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 6).\nRunco, Mark A.; Pritzker, Steven R. (1999). Encyclopedia of Creativity . Academic Press. p. 155. ISBN 978-0-12-227075-8.\nRush, Penelope (2014). \"Introduction\". The Metaphysics of Logic (https://philpapers.org/rec/ RUSTMO-4). Cambridge University Press. pp. 1-10. ISBN 978-1-107-03964-3. Archived (htt ps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the original on 7 December 2021. Retrieved 8 January 2022.\nSadegh-Zadeh, Kazem (2015). Handbook of Analytic Philosophy of Medicine . Springer. p. 983. ISBN 978-94-017-9579-1.\nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\". Teorema: Revista Internacional de Filosofía . 33 (2): 75-88. ISSN 0210-1602 (https://search.worldcat.org/issn/ 0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609).\nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022). Handbook of Logical Thought in India . Springer Nature. pp. 117-8. ISBN 978-81-322-2577-5.\nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic). Encyclopædia Britannica . Retrieved 23 September 2022.\nSchechter, Joshua. \"Epistemology of Logic - Bibliography\" (https://philpapers.org/browse/ep istemology-of-logic). PhilPapers . Retrieved 11 September 2022.", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nBobzien, Susanne (2020). \"Ancient Logic: 2. Aristotle\" (https://plato.stanford.edu/entries/logi c-ancient/#Ari). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Archived (https://web.archive.org/web/20180828102117/https://plato.sta nford.edu/entries/logic-ancient/#Ari) from the original on 28 August 2018. Retrieved 3 January 2022.\nBorchert, Donald, ed. (2006a). \"Computability Theory\". Macmillan Encyclopedia of Philosophy Volume 2 (https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 372390. ISBN 978-0-02-865782-0.\nBorchert, Donald (2006b). \"Induction\". Macmillan Encyclopedia of Philosophy Volume 4 (htt ps://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 635-648. ISBN 978-0-02865784-4. Archived (https://web.archive.org/web/20210112065913/https://philpapers.org/re c/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022.\nBorchert, Donald (2006c). \"Logic, Non-Classical\". Macmillan Encyclopedia of Philosophy Volume 5 (https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 485-492. ISBN 978-0-02-865785-1. Archived (https://web.archive.org/web/20210112065913/https://ph ilpapers.org/rec/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022.\nBoris, Kulik; Alexander, Fridman (30 November 2017). N-ary Relations for Logical Analysis of Data and Knowledge . IGI Global. p. 74. ISBN 978-1-5225-2783-1.", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. org/rec/POSCAW-4). Informal Logic . 36 (4): 563-593. doi:10.22329/il.v36i4.4527 (https://do i.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht tps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved 8 January 2022.\nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan ford.edu/entries/logic-paraconsistent/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 14 December 2021.\nPépin, Jean (2004). \"Logos\". Encyclopedia of Religion (https://www.encyclopedia.com/philo sophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi a.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the original on 29 December 2021. Retrieved 29 December 2021.\nPutnam, H. (1969). \"Is Logic Empirical?\". Boston Studies in the Philosophy of Science . Vol. 5. pp. 216-241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94010-3381-7_5). ISBN 978-94-010-3383-1.\nQuine, Willard Van Orman (1981). Mathematical Logic . Harvard University Press. p. 1. ISBN 978-0-674-55451-1.", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia1.pdf" - }, - { - "text": "References\n79. Scarfone, Matthew (2022). \"Using and Abusing Moorean Arguments\" (https://philpapers.org/ rec/SCAUAA-2). Journal of the American Philosophical Association . 8 (1): 52-71. doi:10.1017/apa.2020.47 (https://doi.org/10.1017%2Fapa.2020.47). S2CID 239672728 (http s://api.semanticscholar.org/CorpusID:239672728).\n80. Augustine of Hippo. \"Book 11, Chapter 26\". City of God .\n81. Descartes, René (1637). \"4\". Discourse on the Method .\n82. Descartes, René (1641). \"Second Meditation\". Meditations on First Philosophy .\n83. Chalmers, David (2020). \"Debunking Arguments for Illusionism\" (https://philpapers.org/rec/C HADAF-2). Journal of Consciousness Studies . 27 (5-6): 258-281.\n84. Chalmers, David (2002). \"Debunking Arguments for Illusionism\" (https://philpapers.org/rec/C HADAF-2). Journal of Consciousness Studies . 27 (5-6): 258-281.\n85. Strawson, G. (2018). \"The Consciousness Deniers\" (https://www.nybooks.com/daily/2018/0 3/13/the-consciousness-deniers/). The New York Review of Books .\n86. Koch, Christof (2019). The Feeling of Life Itself: Why Consciousness is Everywhere But Can't be Computed . MIT Press. p. 2.\n87. Koch, Christof (2019). The Feeling of Life Itself: Why Consciousness is Everywhere But Can't be Computed . MIT Press. p. 3.\n88. Balmer, A. (2020). \"Soft-Wired Illusionism vs. the Meta-Problem of Consciousness\" (https://p hilpapers.org/rec/BALSIV). Journal of Consciousness Studies . 27 (5-6): 26-37.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Bibliography\nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ entries/logic-higher-order/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ https://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. Retrieved 23 November 2021.\nWalton, Douglas N. (1987). Informal Fallacies: Towards a Theory of Argument Criticisms (htt ps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http s://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the original on 2 March 2022. Retrieved 2 January 2022.\nWarren, Jared (2020). Shadows of Syntax: Revitalizing Logical and Mathematical Conventionalism (https://global.oup.com/academic/product/shadows-of-syntax-9780190086 152). Oxford University Press. ISBN 978-0-19-008615-2.\nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r ec/WASLLA-3). Journal of the History of Ideas . 34 (3): 445-50. doi:10.2307/2708963 (http s://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963).\nWasilewska, Anita (2018). Logics for Computer Science: Classical and Non-Classical . Springer. pp. 145-6. ISBN 978-3-319-92591-2.\nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/). Internet Encyclopedia of Philosophy . Retrieved 12 December 2021.", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nHonderich, Ted (2005). The Oxford Companion to Philosophy (https://philpapers.org/rec/HO NTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. org/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 January 2021. Retrieved 2 January 2022.\nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\". Logic: The Essentials . Wadsworth. pp. 189-237. ISBN 978-1-305-59041-0.\nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http s://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on 28 May 2010. Retrieved 6 January 2022.\nIqbal, Mohammad (2013). \"The Spirit of Muslim Culture\". The Reconstruction of Religious Thought in Islam (http://www.allamaiqbal.com/works/prose/english/reconstruction/). Stanford University Press. pp. 99-115. ISBN 978-0-8047-8686-7.\nIrvine, Andrew David (2022). \"Bertrand Russell\" (https://plato.stanford.edu/entries/russell/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 29 September 2022.\nJacquette, Dale (2006). \"Introduction: Philosophy of logic today\". Philosophy of Logic (http s://philpapers.org/rec/JACPOL). North Holland. pp. 1-12. ISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207184932/https://philpapers.org/rec/JACPOL) from the original on 7 December 2021. Retrieved 29 December 2021.", - "page_start": 29, - "page_end": 30, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nWolf, Robert G. (1978). \"Are Relevant Logics Deviant?\" (https://philpapers.org/rec/WOLAR L). Philosophia . 7 (2): 327-340. doi:10.1007/BF02378819 (https://doi.org/10.1007%2FBF02 378819). S2CID 143697796 (https://api.semanticscholar.org/CorpusID:143697796). Archived (https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLAR L) from the original on 16 December 2021. Retrieved 4 January 2022.\nZegarelli, Mark (2010). Logic For Dummies . John Wiley & Sons. p. 30. ISBN 978-1-11805307-2.", - "page_start": 37, - "page_end": 37, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt ps://philpapers.org/rec/SIEENA). Argumentation . 11 (3): 277-292. doi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). S2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// web.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original on 28 February 2022. Retrieved 4 January 2022.\nSimpson, R. L. (2008). Essentials of Symbolic Logic (3rd ed.). Broadview Press. p. 14. ISBN 978-1-77048-495-5.\nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 11 March 2023.\nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e du/entries/ockham/#SummLogi). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University.\nSpriggs, John (2012). GSN - The Goal Structuring Notation: A Structured Approach to Presenting Arguments . Springer Science & Business Media. pp. 20-22. ISBN 978-1-44712312-5.\nStairs, Allen (2017). A Thinker's Guide to the Philosophy of Religion . Routledge. p. 343. ISBN 978-1-351-21981-5.", - "page_start": 35, - "page_end": 35, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nBlackburn, Simon (24 March 2016). \"rule of inference\". The Oxford Dictionary of Philosophy (https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990). Oxford University Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 8194809/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990) from the original on 8 January 2022. Retrieved 8 January 2022.\nBlair, J. Anthony; Johnson, Ralph H. (1987). \"The Current State of Informal Logic\" (https://ph ilpapers.org/rec/BLATCS). Informal Logic . 9 (2): 147-51. doi:10.22329/il.v9i2.2671 (https://d oi.org/10.22329%2Fil.v9i2.2671). Archived (https://web.archive.org/web/20211230194638/ht tps://philpapers.org/rec/BLATCS) from the original on 30 December 2021. Retrieved 2 January 2022.\nBlair, J. Anthony; Johnson, Ralph H. (2000). \"Informal Logic: An Overview\" (https://philpaper s.org/rec/BLAILA-3). Informal Logic . 20 (2): 93-107. doi:10.22329/il.v20i2.2262 (https://doi.o rg/10.22329%2Fil.v20i2.2262). Archived (https://web.archive.org/web/20211209195317/http s://philpapers.org/rec/BLAILA-3) from the original on 9 December 2021. Retrieved 29 December 2021.\nBlair, J. Anthony (20 October 2011). Groundwork in the Theory of Argumentation: Selected Papers of J. Anthony Blair . Springer Science & Business Media. p. 47. ISBN 978-94-0072363-4.", - "page_start": 24, - "page_end": 25, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "What explains mostly the physical behavior that occurs in region iii of thin films ?", - "target_page": 5, - "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nEastern Region ÏÏÏÏÏÏÏÏ $, Gross Revenue = 564.1. Eastern Region ÏÏÏÏÏÏÏÏ $, Intercompany Revenue(b) = $ (79.7) $. Eastern Region ÏÏÏÏÏÏÏÏ $, Net Revenue = 484.4. Eastern Region ÏÏÏÏÏÏÏÏ $, Amortization, and Depletion(c) = $ 32.0. Eastern Region ÏÏÏÏÏÏÏÏ $, Other Charges (Income) = . Eastern Region ÏÏÏÏÏÏÏÏ $, Operating Income = $(4.1) $ 87.0. Eastern Region ÏÏÏÏÏÏÏÏ $, Capital Expenditures(d) = $ 39.2. Eastern Region ÏÏÏÏÏÏÏÏ $, Total Assets = $ 822.2. Central Region ÏÏÏÏÏÏÏÏ, Gross Revenue = 589.6. Central Region ÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (120.2). Central Region ÏÏÏÏÏÏÏÏ, Net Revenue = 469.4. Central Region ÏÏÏÏÏÏÏÏ, Amortization, and Depletion(c) = 53.6. Central Region ÏÏÏÏÏÏÏÏ, Other Charges (Income) = (1.5). Central Region ÏÏÏÏÏÏÏÏ, Operating Income = 105.3. Central Region ÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 77.1. Central Region ÏÏÏÏÏÏÏÏ, Total Assets = 950.9. Southern RegionÏÏÏÏÏÏÏ, Gross Revenue = 643.1. Southern RegionÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (65.5). Southern RegionÏÏÏÏÏÏÏ, Net Revenue = 577.6. Southern RegionÏÏÏÏÏÏÏ, Amortization, and Depletion(c) = 52.7. Southern RegionÏÏÏÏÏÏÏ, Other Charges (Income) = Ì. Southern RegionÏÏÏÏÏÏÏ, Operating Income = 118.3. Southern RegionÏÏÏÏÏÏÏ, Capital Expenditures(d) = 58.0. Southern RegionÏÏÏÏÏÏÏ, Total Assets = 830.7. Southwestern Region ÏÏÏ, Gross Revenue = 311.8. Southwestern Region ÏÏÏ, Intercompany Revenue(b) = (29.1). Southwestern Region ÏÏÏ, Net Revenue = 282.7. Southwestern Region ÏÏÏ, Amortization, and Depletion(c) = 22.8. Southwestern Region ÏÏÏ, Other Charges (Income) = Ì. Southwestern Region ÏÏÏ, Operating Income = 41.9. Southwestern Region ÏÏÏ, Capital Expenditures(d) = 30.6. Southwestern Region", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "10. SEGMENT INFORMATION\nEastern Region ÏÏÏÏÏÏÏÏÏ $, Gross Revenue = 648.6. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Intercompany Revenue(b) = $(103.2). Eastern Region ÏÏÏÏÏÏÏÏÏ $, Net Revenue = $ 545.4. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Depreciation, Amortization, Depletion and Accretion(c) = $ 43.8. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Operating Income = $ 80.0. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Capital Expenditures(d) = $ 51.4. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Total Assets = $ 878.5. Central Region ÏÏÏÏÏÏÏÏÏ, Gross Revenue = 700.9. Central Region ÏÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (156.6). Central Region ÏÏÏÏÏÏÏÏÏ, Net Revenue = 544.3. Central Region ÏÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 79.4. Central Region ÏÏÏÏÏÏÏÏÏ, Operating Income = 100.9. Central Region ÏÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 84.9. Central Region ÏÏÏÏÏÏÏÏÏ, Total Assets = 1,083.6. Southern RegionÏÏÏÏÏÏÏÏ, Gross Revenue = 751.9. Southern RegionÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (79.6). Southern RegionÏÏÏÏÏÏÏÏ, Net Revenue = 672.3. Southern RegionÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 66.7. Southern RegionÏÏÏÏÏÏÏÏ, Operating Income = 110.8. Southern RegionÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 71.4. Southern RegionÏÏÏÏÏÏÏÏ, Total Assets = 879.3. Southwestern Region ÏÏÏÏ, Gross Revenue = 342.1. Southwestern Region ÏÏÏÏ, Intercompany Revenue(b) = (33.0). Southwestern Region ÏÏÏÏ, Net Revenue = 309.1. Southwestern Region ÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 30.6. Southwestern Region ÏÏÏÏ, Operating Income = 41.2. Southwestern Region ÏÏÏÏ, Capital Expenditures(d) = 24.7. Southwestern Region ÏÏÏÏ, Total Assets = 405.3. Western Region ÏÏÏÏÏÏÏÏ, Gross Revenue = 788.4. Western Region", - "page_start": 87, - "page_end": 87, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nEastern Region ÏÏÏÏÏÏÏÏÏ $, Gross Revenue = 600.2. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Intercompany Revenue(b) = $ (93.0). Eastern Region ÏÏÏÏÏÏÏÏÏ $, Net Revenue = $ 507.2. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Depreciation, Amortization, Depletion and Accretion(c) = $ 36.4. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Operating Income = $ 71.3. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Capital Expenditures(d) = $ 40.7. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Total Assets = $ 826.9. Central Region ÏÏÏÏÏÏÏÏÏ, Gross Revenue = 671.7. Central Region ÏÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (151.6). Central Region ÏÏÏÏÏÏÏÏÏ, Net Revenue = 520.1. Central Region ÏÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 74.0. Central Region ÏÏÏÏÏÏÏÏÏ, Operating Income = 106.6. Central Region ÏÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 75.7. Central Region ÏÏÏÏÏÏÏÏÏ, Total Assets = 960.5. Southern RegionÏÏÏÏÏÏÏÏ, Gross Revenue = 680.3. Southern RegionÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (76.9). Southern RegionÏÏÏÏÏÏÏÏ, Net Revenue = 603.4. Southern RegionÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 62.8. Southern RegionÏÏÏÏÏÏÏÏ, Operating Income = 107.5. Southern RegionÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 69.9. Southern RegionÏÏÏÏÏÏÏÏ, Total Assets = 865.6. Southwestern Region ÏÏÏÏ, Gross Revenue = 332.6. Southwestern Region ÏÏÏÏ, Intercompany Revenue(b) = (31.2). Southwestern Region ÏÏÏÏ, Net Revenue = 301.4. Southwestern Region ÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 28.7. Southwestern Region ÏÏÏÏ, Operating Income = 50.2. Southwestern Region ÏÏÏÏ, Capital Expenditures(d) = 28.9. Southwestern Region ÏÏÏÏ, Total Assets = 409.4. Western Region ÏÏÏÏÏÏÏÏ, Gross Revenue = 729.4. Western Region ÏÏÏÏÏÏÏÏ,", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nEastern Region ÏÏÏÏÏÏÏÏ, Balance as of December 31, 2002 = $ 429.0. Eastern Region ÏÏÏÏÏÏÏÏ, Acquisitions = $ 7.2. Eastern Region ÏÏÏÏÏÏÏÏ, Divestitures = $(.3). Eastern Region ÏÏÏÏÏÏÏÏ, Cumulative EÅect of Changes in Accounting Principles = $ Ì. Eastern Region ÏÏÏÏÏÏÏÏ, Balance as of December 31, 2003 = $ 435.9. Central Region ÏÏÏÏÏÏÏÏ, Balance as of December 31, 2002 = 343.0. Central Region ÏÏÏÏÏÏÏÏ, Acquisitions = 7.5. Central Region ÏÏÏÏÏÏÏÏ, Divestitures = Ì. Central Region ÏÏÏÏÏÏÏÏ, Cumulative EÅect of Changes in Accounting Principles = Ì. Central Region ÏÏÏÏÏÏÏÏ, Balance as of December 31, 2003 = 350.5. Southern Region ÏÏÏÏÏÏÏ, Balance as of December 31, 2002 = 323.2. Southern Region ÏÏÏÏÏÏÏ, Acquisitions = 2.6. Southern Region ÏÏÏÏÏÏÏ, Divestitures = Ì. Southern Region ÏÏÏÏÏÏÏ, Cumulative EÅect of Changes in Accounting Principles = Ì. Southern Region ÏÏÏÏÏÏÏ, Balance as of December 31, 2003 = 325.8. Southwestern Region ÏÏÏ, Balance as of December 31, 2002 = 134.7. Southwestern Region ÏÏÏ, Acquisitions = .3. Southwestern Region ÏÏÏ, Divestitures = Ì. Southwestern Region ÏÏÏ, Cumulative EÅect of Changes in Accounting Principles = Ì. Southwestern Region ÏÏÏ, Balance as of December 31, 2003 = 135.0. Western RegionÏÏÏÏÏÏÏÏ, Balance as of December 31, 2002 = 314.3. Western RegionÏÏÏÏÏÏÏÏ, Acquisitions = 3.6. Western RegionÏÏÏÏÏÏÏÏ, Divestitures = Ì. Western RegionÏÏÏÏÏÏÏÏ, Cumulative EÅect of Changes in Accounting Principles = (7.0). Western RegionÏÏÏÏÏÏÏÏ, Balance as of December 31, 2003 = 310.9. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Balance as of December 31, 2002 = $1,544.2. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Acquisitions = $21.2. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Divestitures = $(.3). Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Cumulative EÅect of Changes in Accounting Principles = $(7.0). Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Balance as of December 31, 2003 = $1,558.1", - "page_start": 89, - "page_end": 89, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nÏÏÏ, Total Assets = 374.6. Western Region ÏÏÏÏÏÏÏ, Gross Revenue = 690.0. Western Region ÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (139.1). Western Region ÏÏÏÏÏÏÏ, Net Revenue = 550.9. Western Region ÏÏÏÏÏÏÏ, Amortization, and Depletion(c) = 41.3. Western Region ÏÏÏÏÏÏÏ, Other Charges (Income) = Ì. Western Region ÏÏÏÏÏÏÏ, Operating Income = 145.5. Western Region ÏÏÏÏÏÏÏ, Capital Expenditures(d) = 47.3. Western Region ÏÏÏÏÏÏÏ, Total Assets = 826.7. Corporate Entities(a)ÏÏÏ, Gross Revenue = .2. Corporate Entities(a)ÏÏÏ, Intercompany Revenue(b) = (.1). Corporate Entities(a)ÏÏÏ, Net Revenue = .1. Corporate Entities(a)ÏÏÏ, Amortization, and Depletion(c) = (2.8). Corporate Entities(a)ÏÏÏ, Other Charges (Income) = Ì. Corporate Entities(a)ÏÏÏ, Operating Income = (38.5). Corporate Entities(a)ÏÏÏ, Capital Expenditures(d) = 6.4. Corporate Entities(a)ÏÏÏ, Total Assets = 404.0. , Gross Revenue = TotalÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $2,798.8. , Intercompany Revenue(b) = $(433.7) $2,365.1. , Net Revenue = . , Amortization, and Depletion(c) = $199.6. , Other Charges (Income) = . , Operating Income = $(5.6) $459.5. , Capital Expenditures(d) = $258.6. , Total Assets = $4,209.1\n(a) Corporate functions include legal, tax, treasury, information technology, risk management, human resources, national accounts and other typical administrative functions. The increase in operating income for Corporate Entities from 2003 to 2004 is due primarily to higher self-insurance expense recorded during 2003.\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally made on a basis intended to reÖect the market value of such services.\n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for further information.)", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nIntercompany Revenue(b) = (143.9). Western Region ÏÏÏÏÏÏÏÏ, Net Revenue = 585.5. Western Region ÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 46.2. Western Region ÏÏÏÏÏÏÏÏ, Operating Income = 148.8. Western Region ÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 51.4. Western Region ÏÏÏÏÏÏÏÏ, Total Assets = 813.2. Corporate Entities(a)ÏÏÏÏ, Gross Revenue = .2. Corporate Entities(a)ÏÏÏÏ, Intercompany Revenue(b) = Ì. Corporate Entities(a)ÏÏÏÏ, Net Revenue = .2. Corporate Entities(a)ÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 3.7. Corporate Entities(a)ÏÏÏÏ, Operating Income = (71.7). Corporate Entities(a)ÏÏÏÏ, Capital Expenditures(d) = 6.6. Corporate Entities(a)ÏÏÏÏ, Total Assets = 678.5. , Gross Revenue = TotalÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $3,014.4. , Intercompany Revenue(b) = $(496.6). , Net Revenue = $2,517.8. , Depreciation, Amortization, Depletion and Accretion(c) = $251.8. , Operating Income = $412.7. , Capital Expenditures(d) = $273.2. , Total Assets = $4,554.1\nDepreciation,", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "10. SEGMENT INFORMATION\nÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (151.9). Western Region ÏÏÏÏÏÏÏÏ, Net Revenue = 636.5. Western Region ÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 48.3. Western Region ÏÏÏÏÏÏÏÏ, Operating Income = 158.3. Western Region ÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 48.7. Western Region ÏÏÏÏÏÏÏÏ, Total Assets = 817.6. Corporate Entities(a)ÏÏÏÏ, Gross Revenue = .6. Corporate Entities(a)ÏÏÏÏ, Intercompany Revenue(b) = (.1). Corporate Entities(a)ÏÏÏÏ, Net Revenue = .5. Corporate Entities(a)ÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 4.3. Corporate Entities(a)ÏÏÏÏ, Operating Income = (38.9). Corporate Entities(a)ÏÏÏÏ, Capital Expenditures(d) = 2.7. Corporate Entities(a)ÏÏÏÏ, Total Assets = 400.3. TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Gross Revenue = . TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Intercompany Revenue(b) = $(524.4). TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Net Revenue = $2,708.1. TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Depreciation, Amortization, Depletion and Accretion(c) = $273.1. TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Operating Income = $452.3. TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Capital Expenditures(d) = $283.8. TotalÏÏÏÏÏÏÏÏÏÏ $3,232.5, Total Assets = $4,464.6\n80", - "page_start": 87, - "page_end": 87, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "NAVWEPS 00-801-80 PREFACE\nTABLE OF CONTENTS\nCHAPTER I: BASIC AERODYNAMICS, iii = . WING AND AIRFOIL FORCES, iii = . PROPERTIES OF THE ATMOSPHERE. Static pressure Temperature Density Viscosity Standard atmosphere Pressure altitude Density altitude, iii = 1. BERNOULLI'S PRINCIPLE AND SUBSONIC AIRFLOW.., iii = 4. Bernoulli's equation,, iii = 6. Incompressible tlow Variation of static pressure and velocity Kinetic and porcntial energy of flow Static and dynamic prcssurc, 4, iii = . Airspeed measurement.. . . Stagnation prcssurc Measurement of dynamic pressure Pitot and static sources Indicated airspeed, iii = 9. DEVELOPMENT OF AERODYNAMIC FORCES.. ......., iii = 14. Streamline pattern and pressure distribution. Generatioaoflift.......................................... ....... ......., iii = 14. Circulation Pressure distribution, iii = 16. Airfoil terminology. Aerodynamic force coefficient . . Basic lift equation, iii = ',: 2 3", - "page_start": 6, - "page_end": 6, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Property and Equipment\nin progress Ì landÑllÏÏÏ, Gross Property and Equipment.Balance as of December 31, 2004 = 39.1. Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Balance as of December 31, 2003 = 6.4. Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Capital Additions = 13.7. Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Retirements = Ì. Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Acquisitions, Net of Divestitures = Ì. Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Non-Cash Additions for Asset Retirement Obligations = Ì. Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Transfers and Adjustments = (12.7). Construction in progress Ì other ÏÏÏÏ, Gross Property and Equipment.Balance as of December 31, 2004 = 7.4. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Balance as of December 31, 2003 = $3,304.3. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Capital Additions = $283.8. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Retirements = $(52.2). Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Acquisitions, Net of Divestitures = $37.6. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Non-Cash Additions for Asset Retirement Obligations = $15.3. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Transfers and Adjustments = $ Ì. Total ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Gross Property and Equipment.Balance as of December 31, 2004 = $3,588.8", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Abstract\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions (nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled transport and phase changes. These approaches range from microscopic discrete stochastic theories to mesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor film' that remains behind a mesoscopic dewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative dewetting front which results in highly branched fingering structures. The subtle interplay of decomposition in the film and contact line motion is discussed.\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ coupled evolution equations for the film thickness profile and mean particle concentration. The model is used to discuss the self-pinning and de-pinning of a contact line related to the 'coffee-stain' effect.\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as possible future developments and extensions.\nThe paper is published in: J. Phys.-Cond. Mat. 21 , 264016 (2009), in the Volume 'Nanofluids on solid substrates' and can be obtained at http://dx.doi.org/10.1088/0953-8984/21/26/264016\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "Where are located the magnetic ions in the lattice of the studied layers ?", - "target_page": 2, - "target_passage": "the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nwhich may further disrupt the interface order. The origin of the interface magnetism then had to be inferred by comparison to a series of reference samples 7 . Demonstration of coupling between the bulk of the layers, i.e. , an exchange bias effect, would provide direct evidence of the interface magnetic order. Moreover, such coupling would offer new means of manipulating the FM semiconductor spin state and utilizing the proximity polarization effect in a spintronic device.\nHere, we demonstrate an antiferromagnetic coupling and exchange bias in Fe/(Ga,Mn)As bilayer films, by combining element-specific XMCD measurements and bulk-sensitive superconducting quantum interference device (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in contrast to AFM coupled FM metal/FM metal exchange bias structures 10,11 ) the layers are in direct contact without a non-magnetic spacer in between. We distinguish interface and bulk (Ga,Mn)As layers that are respectively strongly and weakly antiferromagnetically coupled to the Fe overlayer. In agreement with Ref. 7 , the interface layer remains polarized at room temperature.\nThe Fe and (Ga,Mn)As layers of the present study were both grown by molecular beam epitaxy in the same ultra-high vacuum system, in order to ensure a clean interface between them. The (Ga,Mn)As layer of thickness 10 to 50 nm was deposited on a GaAs(001) substrate at a temperature of 260 · C, using previously established methods 3,8 . A low Mn concentration of x ≈ 0 . 03 was chosen in order to avoid the formation of compensating Mn interstitials. The substrate temperature was then reduced to ∼ 0 · C, before depositing a 2 nm Fe layer, plus a 2 nm Al capping layer. In-situ reflection high energy electron diffraction and ex-situ x-ray reflectivity and diffraction measurements confirmed that the layers are single-crystalline with sub-nm interface roughness. SQUID magnetometry measurements were performed using a Quantum Design Magnetic Property Measurement System. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nSimilar behavior is observed for bilayer samples containing a 10 nm or 50 nm (Ga,Mn)As layer, with a bias field which is approximately inversely proportional to the thickness d of the ferromagnetic semiconductor layer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers 4 , and is generally observed in exchanged-biased thin films 12 . From this dependence it is possible to describe the exchange bias in terms of an interface energy per unit area, ∆ E = M FS H E d = 0 . 003 erg/cm 2 . This value is rather small compared to typical exchange bias systems 12 , reflecting the low moment density M FS of the diluted FM semiconductor layer. However, the bias field for a given (Ga,Mn)As thickness is larger than is observed for MnO/(Ga,Mn)As structures 13 , while the reproducibility and flexibility of the present structures is much higher due to the single-crystalline ferromagnetic nature of the Fe layer.\nTo confirm the presence of AFM interlayer coupling, we performed XMCD measurements at the Mn and Fe\n2\nL 2 , 3 absorption edges in order to determine the magnetic response of the individual elements. In L 2 , 3 XMCD, electrons are excited from a 2 p core level to the unoccupied 3 d valence states of the element of interest by circularly polarized x-rays at the resonance energies of the transitions. The difference in absorption for opposite polarizations gives a direct and element-specific measurement of the projection of the 3 d magnetic moment along the xray polarization vector. The absorption cross-section is conventionally obtained by measuring the decay products - either fluorescent x-rays or electrons - of the photoexcited core hole. The type of decay product measured determines the probing depth of the technique. For Mn L 2 , 3 absorption, the probing depths for FY and TEY detection are λ FY ≈ 100 nm and λ TEY ≈ 3 nm. In the current experiment, the Mn XMCD measured using FY and TEY are thus sensitive to the bulk of the (Ga,Mn)As film and the near-interface layers, respectively.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFerromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material. The realization of spin-valve devices from FM semiconductors requires the controlled switching of magnetization in adjacent layers between antiferromagnetic (AFM) and FM configurations. This has motivated several theoretical investigations of interlayer coupling in all-semiconductor devices 1 , and AFM coupling has recently been demonstrated in (Ga,Mn)As multilayers separated by p -type non-magnetic spacers 2 . However, the Curie temperature T C of (Ga,Mn)As is currently limited to 185 K in single layers 3 , and is typically much lower for layers embedded within a heterostructure 2 , which is an obstacle to the practical implementation of semiconductor spintronics.\nThe development of FM metal/FM semiconductor heterostructures has the potential to bring together the benefits of metal and semiconductor based spintronics, offering access to new functionalities and physical phenomena. Recent studies of MnAs/(Ga,Mn)As and NiFe/(Ga,Mn)As bilayer films have shown FM interlayer coupling and independent magnetization behavior, respectively 4,5 . Of particular interest is the Fe/(Ga,Mn)As system, since the growth of epitaxial Fe/GaAs(001) films is well-established 6 . Remarkably, a recent x-ray magnetic circular dichroism (XMCD) study has shown that Fe may induce a proximity polarization in the near-surface region of (Ga,Mn)As, antiparallel to the Fe moment and persisting even above room temperature 7 . Devices incorporating Fe/(Ga,Mn)As therefore offer the prospect of obtaining non-volatile room temperature spin-polarization in a semiconductor.\nUntil now, no information has been revealed about the coupling of Fe to (Ga,Mn)As layers away from the nearsurface region. At the surface, the (Ga,Mn)As layer may be highly non-stoichiometric and Mn-rich, due to its nonequilibrium nature 8,9 . Previously, Fe/(Ga,Mn)As layers were produced by a process including exposure to air followed by sputtering and annealing prior to Fe deposition,", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "IV. DISCUSSION AND CONCLUSION\nFIG. 8: (color online) Q z , position of the maximum of S ( /vector q ), vs. temperature for thickness n = 8. Inset: magnetic vector ( m x l , m y l ) profile for some temperatures for L = 64. Colors and symbols as in Fig. 2.\nFIG. 9: ∆ ϕ l for a BCT lattice and n = 12, when the six coupling constants set employed in Ref. 14,15 (see text) is used. The temperature range has been chosen around T C ( n ) (error bars lye within point size).\ngled out, with the high-temperature, paramagnetic phase separated from the low-temperature, long-range ordered one, by an intermediate-temperature block phase where outer ordered 4-layers blocks coexist with some inner disordered ones. Moreover, it was observed that the phase transition of such inner layers turns out to have the signatures of a Kosterlitz-Thouless one.\nThe absence of the block phase in the J 1 -J 2 model here investigated has to be attributed to the different range of interactions, rather than to the different lattice structure. We came to this conclusion by doing some simulations using the same set of interaction constants employed in Refs. 14,15, but using a BCT lattice: the results we obtained for ∆ ϕ l with n = 12 are reported in Fig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 and clearly displays the footmarks of the block phase (see down-triangle), with two external blocks of ordered layers ( l =1.. . 5 and 8. . . 12 ), where ∆ ϕ l is roughly 10 · , separated by a block of disordered layers, and with almost\nFIG. 10: (colors online) Equilibrium probability distribution of the energy for the thickness n = 8 for some temperatures around T N (8), (a) , and T C (8), (b) , respectively.\nopposite magnetization. We can thus confidently assert that, regardless of the underlying lattice structure, by decreasing the number of the out-of-plane interactions, for thicknesses close to the helical bulk pitch, the block", - "page_start": 5, - "page_end": 6, - "source_file": "1001.0510.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nIn summary, we have demonstrated antiferromagnetic coupling between Fe and (Ga,Mn)As layers in bilayer structures. A markedly different coupling is observed for the bulk of the (Ga,Mn)As layer and for Mn moments in the near-interface region. A thickness-dependent exchange bias field is observed to affect the whole of the bulk (Ga,Mn)As layer, which aligns antiparallel to the Fe layer at low fields, and switches to parallel when the external field is large enough to overcome the bias field and the magnetocrystalline anisotropy fields. In contrast, the interfacial Mn moments remain aligned antiparallel to the Fe layer even at 20 kOe, the largest field studied, and are polarized at temperatures well above the T C of the bulk (Ga,Mn)As layer. The latter observation confirms the recently reported result of Ref. 7, in which the Fe/(Ga,Mn)As bilayers were produced by a different method but showed qualitatively similar behavior of the interfacial moments. Our results shed new light on the magnetic coupling in Fe/(Ga,Mn)As hybrid layers which are of potential interest for room temperature spintronics, and also offer a means of controlling the spin orientation in a FM semiconductor.\nWe acknowledge support from EU grants SemiSpinNet-215368 and NAMASTE-214499, and STFC studentship grant CMPC07100. The Advanced Light Source is supported by the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. We thank Leigh Shelford for help during the Diamond beamtime.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "I. INTRODUCTION\nThe study of low dimensional frustrated magnetic systems 1 still raises great interest, both in consequence of theoretical aspects, related to their peculiar critical properties 2 , and in view of possible technological applications 3 . Indeed, beside conventional ferromagnetic or antiferromagnetic phase transitions, in many new materials other nontrivial and unconventional forms of ordering have been observed 4,5 . A quantity of particular interest in this context is the spin chirality, an order parameter which turned out to be extremely relevant in, e.g., magnetoelectric materials 6 , itinerant MnSi 7 , binary compounds as FeGe 8 , glass transition of spins 9 , and XY helimagnets, as Holmium, Terbium or Dysprosium 10 . In the latter case, a new universality class was predicted because a Z 2 × SO (2) symmetry is spontaneously broken in the ordered phase 2 : In fact, when dealing with such systems, in addition to the SO (2) symmetry of the spin degrees of freedom /vector S i , one has to consider also the Z 2 symmetry of the spin chirality κ ij ∝ [ /vector S i × /vector S j ] z .\nFor these rare-earth elements, the development of new and sophisticated experimental methods 11 has allowed to obtain ultra-thin films where the non-collinear modulation is comparable with the film thickness. Under such conditions the lack of translational invariance due to the presence of surfaces results decisive in order to observe a drastic change of the magnetic structures 12 . Recent experimental data on ultra-thin Holmium films 13 have been lately interpreted and discussed 14,15 on the basis of detailed classical Monte Carlo (MC) simulations of a spin Hamiltonian, which is believed to give a realistic modeling of bulk Holmium. Such Hamiltonian, proposed by Bohr et al. 16 , allows for competitive middle-range in-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "I. INTRODUCTION\nteractions by including six different exchange constants along the c crystallographic axis, and gives a helix pitch wave-vector Q z such that Q z c ' /similarequal 30 · , where c ' = c/ 2 is the distance between nearest neighboring spin layers parallel to the ab crystallographic planes, henceforth denoted also as x -y planes, while z will be taken parallel to c . For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached, while for lower n the film properties are clearly affected by the strong competition among the helical pitch and the surface effects, which involve the majority of the spin layers. In the thickness range n = 9 -16, i.e. right for thickness values comparable with the helical pitch, three different magnetic phases emerged, with the high-temperature, disordered, paramagnetic phase and the low-temperature, long-range ordered one separated by an intriguing, intermediatetemperature block phase, where outer ordered layers coexist with some inner disordered ones, the phase transition of the latter eventually displaying the signatures of a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film collapses once and for all to a quasi-collinear order.\nThe complex phase diagram unveiled by such MC simulations awaken however a further intriguing question: to what extent the observed behavior may be considered a simple consequence of the competition between helical order and surface effects? I.e., is it just a matter of having such a competition or does the range of interactions also play a relevant role? Indeed, when the range of the interactions is large enough we have a greater number of planes which can be thought of as 'surface planes', i.e. for which the number of interacting neighbors are significantly reduced with respect to the bulk layers; therefore, we expect that the larger the interaction range, the stronger should be the surface effects. But, at the same time, the same modulation of the magnetic order can\nFIG. 1: (colors online) (a) : body-centered tetragonal (BCT) lattice with J 0 in-plane coupling constant, and out-of-plane J 1 , and J 2 competing interactions.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "I. INTRODUCTION\nbe achieved with different number of interacting layers: notably, nearest and next-nearest layers competitive interactions are enough to get a helical structure with a whatever pitch wavevector. Such observation gives us a possible way to solve the conundrum previously emerged, as we have the possibility of varying the range of interactions without modifying the helical pitch, thus decoupling the two relevant length scales along the film growth direction, and making accessible a range of n of the order of, or smaller than, the helical pitch, but still large enough that a substantial number of layers can behave as 'bulk' layers. Therefore, while in the previous papers we have studied the properties of ultrathin magnetic films of Ho assuming a model with six interlayer exchange interactions, here we investigate by MC simulations the properties of the same system by making use of the simplest model Hamiltonian able to describe the onset of a helical magnetic order in Holmium, i.e. we consider only two inter-layer coupling constants, as previously done in Ref. 11.\nThe paper is organized as follows: In Sec. II the model Hamiltonian will be defined, and the MC techniques, and all the thermodynamic quantities relevant for this study, will be introduced. In Sec. III the results obtained for different thicknesses will be presented, both in the matter of the critical properties of the model and of the magnetic ordered structures observed. Finally, in Sec. IV we shall discuss such results, drawing also some conclusions.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "I. INTRODUCTION.\nFIG. 2: Left: the physical spin lattice for the model (8). The dash circles are honeycomb lattice sites, each of which is actually a cluster of four physical spins. The dash straight lines are honeycomb lattice bonds, with their type x, y, z labeled. The interaction between clusters connected by x, y, z bonds are the J x,y,z terms in (8) or (9) respectively. Note this is not the 3-12 lattice used in Ref. 9,10 . Right: enlarged picture of the clusters with the four physical spins labeled as 1 , . . . , 4. Thick solid bonds within one cluster have large antiferromagnetic Heisenberg coupling J cluster .\ntion III the Kitaev model will be explicitly constructed using this formalism, and some properties of this construction will be discussed. In Section IV we will discuss two possible ways to generate the high order spin interactions involved in the construction of Section III by perturbative expansions. Conclusions and outlook will be summarized in Section V.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "What is the minimum number of spin layers in a film before a correct bulk is reached ?", - "target_page": 1, - "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "I. Introduction.\n1\nII. Formulation of the Pseudo-spin-1/2 from Four-spin Cluster.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nTABLE I: Correspondence between physical spin operators and pseudo-spin operators in the physical spin singlet sector of the four antiferromagnetically coupled physical spins. P jk = 2 S j · S k +1 / 2 are permutation operators, χ jk/lscript = S j · ( S k × S /lscript ) are spin-chirality operators. Note that several physical spin operators may correspond to the same pseudo-spin operator.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "V. CONCLUSIONS.\nWe constructed the exactly solvable Kitaev honeycomb model 1 as the exact low energy effective Hamiltonian of a spin-1/2 model [equations (8) or (9)] with spin-rotation and time reversal symmetry. The spin in Kitaev model is represented as the pseudo-spin in the two-fold degenerate spin singlet subspace of a cluster of four antiferromagnetically coupled spin-1/2 moments. The physical spin model is a honeycomb lattice of such four-spin clusters, with certain inter-cluster interactions. The machinery for the exact mapping to pseudo-spin Hamiltonian was developed (see e.g. TABLE I), which is quite general and can be used to construct other interesting (exactly solvable) spin-1/2 models from spin rotation invariant systems.\nIn this construction the pseudo-spin correlations in the Kitaev model will be mapped to dimer or spin-chirality correlations in the physical spin system. The corresponding picture of the fractionalized Majorana fermion excitations and Ising vortices still remain to be clarified.\nThis exact construction contains high order physical spin interactions, which is undesirable for practical implementation. We described two possible approaches to reduce this problem: generating the high order spin interactions by perturbative expansion of the coupling to optical phonon, or the magnetic coupling between clusters. This perturbative construction will introduce truncation error of perturbation series, which may be controlled by small expansion parameters. Whether these constructions can be experimentally engineered is however beyond the scope of this study. It is conceivable that other perturbative expansion can also generate these high order spin interactions, but this possibility will be left for future works.", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nTABLE I: Correspondence between physical spin operators and pseudo-spin operators in the physical spin singlet sector of the four antiferromagnetically coupled physical spins. P jk = 2 S j · S k +1 / 2 are permutation operators, χ jk/lscript = S j · ( S k × S /lscript ) are spin-chirality operators. Note that several physical spin operators may correspond to the same pseudo-spin operator.\nP 12 , and P 34, pseudo-spin = τ x. P 13 , and P 24, pseudo-spin = - (1 / 2) τ x +( √ 3 / 2) τ y. P 14 , and P 23, pseudo-spin = - (1 / 2) τ x - ( √ 3 / 2) τ y. χ 234 , χ 341 , χ 412 , and χ 123, pseudo-spin = ( √ 3 / 4) τ z", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin Rotation Invariant System\nFa Wang 1\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamiltonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low energy effective Hamiltonian is exact, without truncation errors in traditional perturbation series expansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and contains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model is represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet sector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin correlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this model. This exact construction is quite general and can be used to make other interesting spin-1/2 models from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the high order spin interactions from more natural couplings, which involves perturbative expansions thus breaks the exact mapping, although in a controlled manner.\nPACS numbers: 75.10.Jm, 75.10.Kt", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "I. INTRODUCTION\nteractions by including six different exchange constants along the c crystallographic axis, and gives a helix pitch wave-vector Q z such that Q z c ' /similarequal 30 · , where c ' = c/ 2 is the distance between nearest neighboring spin layers parallel to the ab crystallographic planes, henceforth denoted also as x -y planes, while z will be taken parallel to c . For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached, while for lower n the film properties are clearly affected by the strong competition among the helical pitch and the surface effects, which involve the majority of the spin layers. In the thickness range n = 9 -16, i.e. right for thickness values comparable with the helical pitch, three different magnetic phases emerged, with the high-temperature, disordered, paramagnetic phase and the low-temperature, long-range ordered one separated by an intriguing, intermediatetemperature block phase, where outer ordered layers coexist with some inner disordered ones, the phase transition of the latter eventually displaying the signatures of a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film collapses once and for all to a quasi-collinear order.\nThe complex phase diagram unveiled by such MC simulations awaken however a further intriguing question: to what extent the observed behavior may be considered a simple consequence of the competition between helical order and surface effects? I.e., is it just a matter of having such a competition or does the range of interactions also play a relevant role? Indeed, when the range of the interactions is large enough we have a greater number of planes which can be thought of as 'surface planes', i.e. for which the number of interacting neighbors are significantly reduced with respect to the bulk layers; therefore, we expect that the larger the interaction range, the stronger should be the surface effects. But, at the same time, the same modulation of the magnetic order can\nFIG. 1: (colors online) (a) : body-centered tetragonal (BCT) lattice with J 0 in-plane coupling constant, and out-of-plane J 1 , and J 2 competing interactions.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "I. INTRODUCTION.\nIn this paper we realize the Kitaev honeycomb lattice model as the low energy Hamiltonian for a spin rotation invariant system. The trick is not to use the physical spin as the spin in the Kitaev model, instead the spin-1/2 in Kitaev model is from some emergent two-fold degenerate low energy states in the elementary unit of physical system. This type of idea has been explored recently by Jackeli and Khaliullin 20 , in which the spin-1/2 in the Kitaev model is the low energy Kramers doublet created by strong spin-orbit coupling of t 2 g orbitals. In the model presented below, the Hilbert space of spin-1/2 in the Kitaev model is actually the two dimensional spin singlet sector of four antiferromagnetically coupled spin-1/2 moments, and the role of spin-1/2 operators(Pauli matrices) in the Kitaev model is replaced by certain combinations of S j · S k [or the spin-chirality S j · ( S k × S /lscript )] between the four spins.\nOne major drawback of the model to be presented is that it contains high order spin interactions(involves up to six or eight spins), thus is still unnatural. However it opens the possibility to realize exotic (exactly solvable) models from spin-1/2 Hamiltonian with spin rotation invariant interactions. We will discuss two possible routes to reduce this artificialness through controlled perturbative expansions, by coupling to optical phonons or by magnetic couplings between the elementary units.\nThe outline of this paper is as follows. In Section II we will lay out the pseudo-spin-1/2 construction. In Sec-\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\n-\n-\nHowever there is another simpler representation of τ z , by the spin-chirality operator χ jk/lscript = S j · ( S k × S /lscript ). Explicit calculation shows that the effect of S 2 · ( S 3 × S 4 ) is -( √ 3 / 4) τ z in the physical singlet sector. This can also be proved by using the commutation relation [ S 2 · S 3 , S 2 · S 4 ] = i S 2 · ( S 3 × S 4 ). A complete list of all chirality operators is given in TABLE I. Therefore we can choose another representation of τ z ,\nτ z = -χ 234 / ( √ 3 / 4) = -(4 / √ 3) S 2 · ( S 3 × S 4 ) (6)\nThe above representations of τ x,y,z are all invariant under global spin rotation of the physical spins.\nWith the machinery of equations (4), (5), and (6), it will be straightforward to construct various pseudo-spin1/2 Hamiltonians on various lattices, of the Kitaev variety and beyond, as the exact low energy effective Hamiltonian of certain spin-1/2 models with spin-rotation symmetry. In these constructions a pseudo-spin lattice site actually represents a cluster of four spin-1/2 moments.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nIn this Section we will construct the pseudo-spin-1/2 from a cluster of four physical spins, and map the physical spin operators to pseudo-spin operators. The mapping constructed here will be used in later Sections to construct the effective Kitaev model. In this Section we will work entirely within the four-spin cluster, all unspecified physical spin subscripts take values 1 , . . . , 4.\nConsider a cluster of four spin-1/2 moments(called physical spins hereafter), labeled by S 1 ,..., 4 , antiferromagnetically coupled to each other (see the right bottom part of FIG. 2). The Hamiltonian within the cluster(up to a constant) is simply the Heisenberg antiferromagnetic(AFM) interactions,\nH cluster = ( J cluster / 2) ( S 1 + S 2 + S 3 + S 4 ) 2 (2)\nThe energy levels should be apparent from this form: one group of spin-2 quintets with energy 3 J cluster , three groups of spin-1 triplets with energy J cluster , and two spin singlets with energy zero. We will consider large positive\nJ cluster limit. So only the singlet sector remains in low energy.\nThe singlet sector is then treated as a pseudo-spin-1/2 Hilbert space. From now on we denote the pseudo-spin1/2 operators as T = (1 / 2) /vectorτ , with /vectorτ the Pauli matrices. It is convenient to choose the following basis of the pseudo-spin\n| τ z = ± 1 〉 = 1 √ 6 ( | ↓↓↑↑〉 + ω -τ z | ↓↑↓↑〉 + ω τ z | ↓↑↑↓〉 + | ↑↑↓↓〉 + ω -τ z | ↑↓↑↓〉 + ω τ z | ↑↓↓↑〉 ) (3)\nwhere ω = e 2 πi/ 3 is the complex cubic root of unity, | ↓↓↑↑〉 and other states on the right-hand-side(RHS) are basis states of the four-spin system, in terms of S z quantum numbers of physical spins 1 , . . . , 4 in sequential order. This pseudo-spin representation has been used by Harris et al. to study magnetic ordering in pyrochlore antiferromagnets 21 .", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe briefly describe some of the properties of (8). Its low energy states are entirely in the space that each of the clusters is a physical spin singlet (called cluster singlet subspace hereafter). Therefore physical spin correlations are strictly confined within each cluster. The excitations carrying physical spin are gapped, and their dynamics are 'trivial' in the sense that they do not move from one cluster to another. But there are non-trivial low energy physical spin singlet excitations, described by the pseudospins defined above. The correlations of the pseudo-spins can be mapped to correlations of their corresponding physical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation becomes chirality-chirality correlation, or four-dimer correlation. It will be interesting to see the corresponding picture of the exotic excitations in the Kitaev model, e.g. the Majorana fermion and the Ising vortex. However this will be deferred to future studies.\nIt is tempting to call this as an exactly solved spin liquid with spin gap ( ∼ J cluster ), an extremely short-range resonating valence bond(RVB) state, from a model with spin rotation and time reversal symmetry. However it should be noted that the unit cell of this model contains an even number of spin-1/2 moments (so does the original Kitaev model) which does not satisfy the stringent definition of spin liquid requiring odd number of electrons per unit cell. Several parent Hamiltonians of spin liquids have already been constructed. See for example, Ref. 24-27 .", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "What the rough sales amount of the nordstrom.com website ?", - "target_page": 3, - "target_passage": "$2 billion in nordstrom.com sales", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "1 million\nSTORE VISITS FROM CUSTOMERS RETURNING THEIR HAUTELOOK AND NORDSTROMRACK.COM PURCHASES TO NORDSTROM RACK.\nALMOST\nIN NORDSTROM.COM SALES. THAT'S MORE THAN DOUBLE OUR SALES\nFROM JUST THREE YEARS AGO.\nMORE THAN\nNEW MEMBERS JOINED OUR NORDSTROM REWARDS™ PROGRAM FOR THE THIRD YEAR IN A ROW.\nFULL -PRICE\nOFF -PRICE\nSTORES\nONLINE", - "page_start": 2, - "page_end": 3, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Erik B. Nordstrom\nPresident of Nordstrom.com, Nordstrom, Inc.\n' I don't think I could've received better news today. Nordstrom Rack has now launched online! '\nOUR CUSTOMER, JOANNA D.\n9\n' I've found that Nordstrom employees go to great lengths to please the customer. That's hard to find in most stores these days.\n'\nOUR CUSTOMER, SUSAN F.\n10", - "page_start": 8, - "page_end": 9, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales (2014 vs. 2013)\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we opened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the acquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These additions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared with 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number of items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics and Men's Apparel.\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The topperforming geographic regions for full-line stores were the Southeast and Southwest.\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales increased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of 27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories for the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was flat.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales\nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014.\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with the same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our merchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men's Apparel.\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales of 0.5%. The Southwest and Southeast were the top-performing geographic regions.\nNordstrom.com net sales increased $115, or 19%, on top of last year's 30% increase for the same period. Nordstromrack.com and HauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\n24\nNordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter of 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack.", - "page_start": 35, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nNordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762\n1 Other retail includes our Jeffrey boutiques, Trunk Club and our Nordstrom Canada full-line store.\nThe following table summarizes net sales by merchandise category:", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Retail Business Net Sales\nNet sales by channel:, 2014 = . Net sales by channel:, 2013 = . Net sales by channel:, 2012 = . Nordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762. Net sales increase, 2014 = 7.8%. Net sales increase, 2013 = 3.4%. Net sales increase, 2012 = 12.1%. Comparable sales increase (decrease) by channel 2 :, 2014 = . Comparable sales increase (decrease) by channel 2 :, 2013 = . Comparable sales increase (decrease) by channel 2 :, 2012 = . Nordstrom full-line stores - U.S., 2014 = (0.5%). Nordstrom full-line stores - U.S., 2013 = (2.1%). Nordstrom full-line stores - U.S., 2012 = 3.9%. Nordstrom.com, 2014 = 23.1%. Nordstrom.com, 2013 = 29.5%.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Blake W. Nordstrom\nPresident, Nordstrom, Inc.\nPeter E. Nordstrom\nPresident of Merchandising, Nordstrom, Inc.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "DESCRIPTION OF BUSINESS\nAs of March 16, 2015, the Retail segment includes our 115 'Nordstrom' branded full-line stores in the U.S. and Nordstrom.com, 167 off-price Nordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club showrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name 'Last Chance.' Through these multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality brand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores and online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that store's inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar Rapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids fulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom full-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels and improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in Nordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During the year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of HauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and lifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer log-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at any Nordstrom Rack location.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "DESCRIPTION OF BUSINESS\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one of the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a robust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two Nordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have two reportable segments: Retail and Credit.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "OFF-PRICE: NORDSTROM RACK, NORDSTROMRACK.COM AND HAUTELOOK\nWe opened a record 27 new Nordstrom Rack stores, ending 2014 with 167 stores and on track to meet our long-term growth plans\nof 300 stores by 2020. Customers continue to respond favorably to the treasure-hunt experience that defines Nordstrom Rack stores. As we expand in many markets for the first time, we hope to continue delivering a great experience, as this business represents a terrific opportunity for us to attract new customers. Last year, Nordstrom Rack was our biggest source of new customers, attracting nearly 4 million. Also, a year ago, we began accepting returns of HauteLook and Nordstromrack.com merchandise at any Nordstrom Rack store. This drove nearly 1 million trips to Nordstrom Rack stores in 2014. The Nordstrom Rack customer also tends to be younger than our full-line customer, and there is a meaningful opportunity for these customers to begin shopping our full-price channels as well. We plan to open 27 more Nordstrom Racks in 2015 across the U.S.\n' I love how you used models with physical challenges in your Anniversary catalog. Nice work! '\nOUR CUSTOMER, DONNA A.\n7\n»› THAT'S BRILLIANT! WE'LL HAVE TOPSHOP IN 80 STORES BY THE END OF 2015-AND THAT'S JUST ONE OF THE WAYS WE'RE ATTRACTING NEW YOUNG CUSTOMERS WITH GREAT BRANDS AT ACCESSIBLE PRICE POINTS.\n' Praise the fashion gods. Nordstrom Downtown Portland is opening Topshop in the next month.\n'\nOUR CUSTOMER, KARLY T.\n«‹ A PERFECT PAIR: SHOES AND SJP ACTRESS AND STYLE ICON SARAH JESSICA PARKER DESIGNED HER OWN SHOE LINE, SJP, AND WE WERE THE EXCLUSIVE RETAILER FOR ITS LAUNCH.\nIn addition to our new stores, we improved our online/o/ff-price capabilities with the launch of Nordstromrack.com. Combined with HauteLook, the integrated ecommerce site o/ffers a consistent merchandise selection as well as flash sales in a single web or mobile experience, providing customers a wide range of merchandise with one easy-to-use, shared checkout. Since the launch last spring, we've more than doubled the selection at Nordstromrack.com. We will continue to work on ways to further integrate our business to improve our customer experience.", - "page_start": 6, - "page_end": 7, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "How many employees did Nordstrom count in 2014 ?", - "target_page": 17, - "target_passage": "During 2014, we employed approximately 67,000 employees on a full- or part-time basis.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Notes to Consolidated Financial Statements\nNordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762\n1 Other retail includes our Jeffrey boutiques, Trunk Club and our Nordstrom Canada full-line store.\nThe following table summarizes net sales by merchandise category:", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Blake W. Nordstrom\nPresident, Nordstrom, Inc.\nPeter E. Nordstrom\nPresident of Merchandising, Nordstrom, Inc.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Retail Business Net Sales\nNet sales by channel:, 2014 = . Net sales by channel:, 2013 = . Net sales by channel:, 2012 = . Nordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762. Net sales increase, 2014 = 7.8%. Net sales increase, 2013 = 3.4%. Net sales increase, 2012 = 12.1%. Comparable sales increase (decrease) by channel 2 :, 2014 = . Comparable sales increase (decrease) by channel 2 :, 2013 = . Comparable sales increase (decrease) by channel 2 :, 2012 = . Nordstrom full-line stores - U.S., 2014 = (0.5%). Nordstrom full-line stores - U.S., 2013 = (2.1%). Nordstrom full-line stores - U.S., 2012 = 3.9%. Nordstrom.com, 2014 = 23.1%. Nordstrom.com, 2013 = 29.5%.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "1 million\nSTORE VISITS FROM CUSTOMERS RETURNING THEIR HAUTELOOK AND NORDSTROMRACK.COM PURCHASES TO NORDSTROM RACK.\nALMOST\nIN NORDSTROM.COM SALES. THAT'S MORE THAN DOUBLE OUR SALES\nFROM JUST THREE YEARS AGO.\nMORE THAN\nNEW MEMBERS JOINED OUR NORDSTROM REWARDS™ PROGRAM FOR THE THIRD YEAR IN A ROW.\nFULL -PRICE\nOFF -PRICE\nSTORES\nONLINE", - "page_start": 2, - "page_end": 3, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Capital Expenditures\nTotal, beginning of year, Store count.2014 = 260. Total, beginning of year, Store count.2013 = 240. Total, beginning of year, Store count.2012 = 225. Total, beginning of year, Square footage.2014 = 26.0. Total, beginning of year, Square footage.2013 = 25.3. Total, beginning of year, Square footage.2012 = 24.7. Store openings:, Store count.2014 = . Store openings:, Store count.2013 = . Store openings:, Store count.2012 = . Store openings:, Square footage.2014 = . Store openings:, Square footage.2013 = . Store openings:, Square footage.2012 = . Nordstrom full-line stores - U.S., Store count.2014 = 2. Nordstrom full-line stores - U.S., Store count.2013 = -. Nordstrom full-line stores - U.S., Store count.2012 = 1. Nordstrom full-line stores - U.S., Square footage.2014 = 0.3. Nordstrom full-line stores - U.S., Square footage.2013 = -. Nordstrom full-line stores - U.S., Square footage.2012 = 0.1. Nordstrom Rack and other stores 1, Store count.2014 = 29. Nordstrom Rack and other stores 1, Store count.2013 = 22. Nordstrom Rack and other stores 1, Store count.2012 = 15. Nordstrom Rack and other stores 1, Square footage.2014 = 1.2. Nordstrom Rack and other stores 1, Square footage.2013 = 0.7. Nordstrom Rack and other stores 1, Square footage.2012 = 0.6. Stores acquired, Store count.2014 = 4. Stores acquired, Store count.2013 = -. Stores acquired, Store count.2012 = -. Stores acquired, Square footage.2014 = -. Stores acquired, Square footage.2013 = -. Stores acquired, Square footage.2012 = . Stores closed, Store count.2014 = (3). Stores closed, Store count.2013 = (2). Stores closed, Store count.2012 = (1). Stores closed, Square footage.2014 = (0.4). Stores closed, Square footage.2013 = -. Stores closed, Square footage.2012 = (0.1). Total, end of year, Store count.2014 = 292. Total, end of year,", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Erik B. Nordstrom\nPresident of Nordstrom.com, Nordstrom, Inc.\n' I don't think I could've received better news today. Nordstrom Rack has now launched online! '\nOUR CUSTOMER, JOANNA D.\n9\n' I've found that Nordstrom employees go to great lengths to please the customer. That's hard to find in most stores these days.\n'\nOUR CUSTOMER, SUSAN F.\n10", - "page_start": 8, - "page_end": 9, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Accounts Receivable\nOur Nordstrom private label credit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, Nordstromrack.com and HauteLook, while our Nordstrom Visa credit cards also may be used for purchases outside of Nordstrom. Cash flows from the use of both the private label and Nordstrom Visa credit cards for sales originating at our stores and our website are treated as an operating activity within the Consolidated Statements of Cash Flows, as they relate to sales at Nordstrom. Cash flows arising from the use of Nordstrom Visa credit cards outside of our stores are treated as an investing activity within the Consolidated Statements of Cash Flows, as they represent loans made to our customers for purchases at third parties.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "CREDIT SEGMENT\nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty benefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers by fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer loyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label credit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, Nordstromrack.com and HauteLook ('inside volume'), while our Nordstrom Visa credit cards also may be used for purchases outside of Nordstrom ('outside volume'). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for their purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes ® , which can be redeemed for goods or services at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers receive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending, they can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events.\nIn May 2014, we announced our plan to review options for a potential financial partner for our credit card receivables portfolio. We intend to execute a transaction only if our strategic and financial requirements are met. In the event a transaction is finalized, we will classify the relevant credit card receivables as held for sale, which could result in a gain or loss upon reclassification.", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "The Company\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a well-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This breadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. We offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 'Nordstrom' branded full-line stores in the U.S. and at Nordstrom.com (collectively, 'Nordstrom'), one Canada full-line store, 167 off-price Nordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one Last Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada.\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label card, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in our loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment would incur if our customers used third-party cards.", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Item 2. Properties.\n(000's) = 595. Massachusetts, Nordstrom Rack and Other 1.Count = 5. Massachusetts, Nordstrom Rack and Other 1.Square Footage (000's) = 193. Massachusetts, Total.Count = 9. Massachusetts, Total.Square Footage (000's) = 788. Michigan, Count = 3. Michigan, U.S..Square Footage (000's) = 552. Michigan, Nordstrom Rack and Other 1.Count = 4. Michigan, Nordstrom Rack and Other 1.Square Footage (000's) = 145. Michigan, Total.Count = 7. Michigan, Total.Square Footage (000's) = 697. Minnesota, Count = 1. Minnesota, U.S..Square Footage (000's) = 240. Minnesota, Nordstrom Rack and Other 1.Count = 2. Minnesota, Nordstrom Rack and Other 1.Square Footage (000's) = 75. Minnesota, Total.Count = 3. Minnesota, Total.Square Footage (000's) = 315. Missouri, Count = 2. Missouri, U.S..Square Footage (000's) = 342. Missouri, Nordstrom Rack and Other 1.Count = 2. Missouri, Nordstrom Rack and Other 1.Square Footage (000's) = 69. Missouri, Total.Count = 4. Missouri, Total.Square Footage (000's) = 411. Nevada, Count = 1. Nevada, U.S..Square Footage (000's) = 207. Nevada, Nordstrom Rack and Other 1.Count = 2. Nevada, Nordstrom Rack and Other 1.Square Footage (000's) = 70. Nevada, Total.Count = 3. Nevada, Total.Square Footage (000's) = 277. New Jersey, Count = 5. New Jersey, U.S..Square Footage (000's) = 991. New Jersey, Nordstrom Rack and Other 1.Count = 3. New Jersey, Nordstrom Rack and Other 1.Square Footage (000's) = 102. New Jersey, Total.Count = 8. New Jersey, Total.Square Footage (000's) = 1,093. New York, Count = 2. New York, U.S..Square Footage (000's) = 460. New York, Nordstrom Rack and Other 1.Count = 10. New York, Nordstrom Rack", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "How many stores did Nordstrom posses at the end of 2014 ?", - "target_page": 22, - "target_passage": "Number of stores, end of year : 292", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "DESCRIPTION OF BUSINESS\nAs of March 16, 2015, the Retail segment includes our 115 'Nordstrom' branded full-line stores in the U.S. and Nordstrom.com, 167 off-price Nordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club showrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name 'Last Chance.' Through these multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality brand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores and online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that store's inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar Rapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids fulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom full-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels and improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in Nordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During the year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of HauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and lifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer log-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at any Nordstrom Rack location.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "1 million\nSTORE VISITS FROM CUSTOMERS RETURNING THEIR HAUTELOOK AND NORDSTROMRACK.COM PURCHASES TO NORDSTROM RACK.\nALMOST\nIN NORDSTROM.COM SALES. THAT'S MORE THAN DOUBLE OUR SALES\nFROM JUST THREE YEARS AGO.\nMORE THAN\nNEW MEMBERS JOINED OUR NORDSTROM REWARDS™ PROGRAM FOR THE THIRD YEAR IN A ROW.\nFULL -PRICE\nOFF -PRICE\nSTORES\nONLINE", - "page_start": 2, - "page_end": 3, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "The Company\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a well-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This breadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. We offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 'Nordstrom' branded full-line stores in the U.S. and at Nordstrom.com (collectively, 'Nordstrom'), one Canada full-line store, 167 off-price Nordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one Last Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada.\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label card, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in our loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment would incur if our customers used third-party cards.", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nNordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762\n1 Other retail includes our Jeffrey boutiques, Trunk Club and our Nordstrom Canada full-line store.\nThe following table summarizes net sales by merchandise category:", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Item 2. Properties.\nThe following table summarizes the number of retail stores we own or lease, and the percentage of total store square footage represented by each listed category as of January 31, 2015:\nLeased stores on leased land, Number of stores = 195. Leased stores on leased land, % of total store square footage = 38%. Owned stores on leased land, Number of stores = 61. Owned stores on leased land, % of total store square footage = 40%. Owned stores on owned land, Number of stores = 35. Owned stores on owned land, % of total store square footage = 21%. Partly owned and partly leased store, Number of stores = 1. Partly owned and partly leased store, % of total store square footage = 1%. Total, Number of stores = 292. Total, % of total store square footage = 100%\nThe following table summarizes our store activity during the last three years:\nNumber of stores, beginning of year, 2014 = 260. Number of stores, beginning of year, 2013 = 240. Number of stores, beginning of year, 2012 = 225. Stores opened, 2014 = 31. Stores opened, 2013 = 22. Stores opened, 2012 = 16. Stores acquired, 2014 = 4. Stores acquired, 2013 = -. Stores acquired, 2012 = -. Stores closed, 2014 = (3). Stores closed, 2013 = (2). Stores closed, 2012 = (1). Number of stores, end of year, 2014 = 292. Number of stores, end of year, 2013 = 260. Number of stores, end of year, 2012 = 240. Nordstrom full-line stores - U.S., 2014 = 116. Nordstrom full-line stores - U.S., 2013 = 117. Nordstrom full-line stores - U.S., 2012 = 117. Nordstrom Rack, 2014 = 167. Nordstrom Rack, 2013 = 140. Nordstrom Rack, 2012 = 119. Other 1, 2014 = 9. Other 1, 2013 = 3. Other 1, 2012 = 4\n1 Other includes Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Capital Expenditures\nTotal, beginning of year, Store count.2014 = 260. Total, beginning of year, Store count.2013 = 240. Total, beginning of year, Store count.2012 = 225. Total, beginning of year, Square footage.2014 = 26.0. Total, beginning of year, Square footage.2013 = 25.3. Total, beginning of year, Square footage.2012 = 24.7. Store openings:, Store count.2014 = . Store openings:, Store count.2013 = . Store openings:, Store count.2012 = . Store openings:, Square footage.2014 = . Store openings:, Square footage.2013 = . Store openings:, Square footage.2012 = . Nordstrom full-line stores - U.S., Store count.2014 = 2. Nordstrom full-line stores - U.S., Store count.2013 = -. Nordstrom full-line stores - U.S., Store count.2012 = 1. Nordstrom full-line stores - U.S., Square footage.2014 = 0.3. Nordstrom full-line stores - U.S., Square footage.2013 = -. Nordstrom full-line stores - U.S., Square footage.2012 = 0.1. Nordstrom Rack and other stores 1, Store count.2014 = 29. Nordstrom Rack and other stores 1, Store count.2013 = 22. Nordstrom Rack and other stores 1, Store count.2012 = 15. Nordstrom Rack and other stores 1, Square footage.2014 = 1.2. Nordstrom Rack and other stores 1, Square footage.2013 = 0.7. Nordstrom Rack and other stores 1, Square footage.2012 = 0.6. Stores acquired, Store count.2014 = 4. Stores acquired, Store count.2013 = -. Stores acquired, Store count.2012 = -. Stores acquired, Square footage.2014 = -. Stores acquired, Square footage.2013 = -. Stores acquired, Square footage.2012 = . Stores closed, Store count.2014 = (3). Stores closed, Store count.2013 = (2). Stores closed, Store count.2012 = (1). Stores closed, Square footage.2014 = (0.4). Stores closed, Square footage.2013 = -. Stores closed, Square footage.2012 = (0.1). Total, end of year, Store count.2014 = 292. Total, end of year,", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "OFF-PRICE: NORDSTROM RACK, NORDSTROMRACK.COM AND HAUTELOOK\nWe opened a record 27 new Nordstrom Rack stores, ending 2014 with 167 stores and on track to meet our long-term growth plans\nof 300 stores by 2020. Customers continue to respond favorably to the treasure-hunt experience that defines Nordstrom Rack stores. As we expand in many markets for the first time, we hope to continue delivering a great experience, as this business represents a terrific opportunity for us to attract new customers. Last year, Nordstrom Rack was our biggest source of new customers, attracting nearly 4 million. Also, a year ago, we began accepting returns of HauteLook and Nordstromrack.com merchandise at any Nordstrom Rack store. This drove nearly 1 million trips to Nordstrom Rack stores in 2014. The Nordstrom Rack customer also tends to be younger than our full-line customer, and there is a meaningful opportunity for these customers to begin shopping our full-price channels as well. We plan to open 27 more Nordstrom Racks in 2015 across the U.S.\n' I love how you used models with physical challenges in your Anniversary catalog. Nice work! '\nOUR CUSTOMER, DONNA A.\n7\n»› THAT'S BRILLIANT! WE'LL HAVE TOPSHOP IN 80 STORES BY THE END OF 2015-AND THAT'S JUST ONE OF THE WAYS WE'RE ATTRACTING NEW YOUNG CUSTOMERS WITH GREAT BRANDS AT ACCESSIBLE PRICE POINTS.\n' Praise the fashion gods. Nordstrom Downtown Portland is opening Topshop in the next month.\n'\nOUR CUSTOMER, KARLY T.\n«‹ A PERFECT PAIR: SHOES AND SJP ACTRESS AND STYLE ICON SARAH JESSICA PARKER DESIGNED HER OWN SHOE LINE, SJP, AND WE WERE THE EXCLUSIVE RETAILER FOR ITS LAUNCH.\nIn addition to our new stores, we improved our online/o/ff-price capabilities with the launch of Nordstromrack.com. Combined with HauteLook, the integrated ecommerce site o/ffers a consistent merchandise selection as well as flash sales in a single web or mobile experience, providing customers a wide range of merchandise with one easy-to-use, shared checkout. Since the launch last spring, we've more than doubled the selection at Nordstromrack.com. We will continue to work on ways to further integrate our business to improve our customer experience.", - "page_start": 6, - "page_end": 7, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "CREDIT SEGMENT\nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty benefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers by fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer loyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label credit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, Nordstromrack.com and HauteLook ('inside volume'), while our Nordstrom Visa credit cards also may be used for purchases outside of Nordstrom ('outside volume'). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for their purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes ® , which can be redeemed for goods or services at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers receive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending, they can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events.\nIn May 2014, we announced our plan to review options for a potential financial partner for our credit card receivables portfolio. We intend to execute a transaction only if our strategic and financial requirements are met. In the event a transaction is finalized, we will classify the relevant credit card receivables as held for sale, which could result in a gain or loss upon reclassification.", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Blake W. Nordstrom\nPresident, Nordstrom, Inc.\nPeter E. Nordstrom\nPresident of Merchandising, Nordstrom, Inc.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Accounts Receivable\nOur Nordstrom private label credit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, Nordstromrack.com and HauteLook, while our Nordstrom Visa credit cards also may be used for purchases outside of Nordstrom. Cash flows from the use of both the private label and Nordstrom Visa credit cards for sales originating at our stores and our website are treated as an operating activity within the Consolidated Statements of Cash Flows, as they relate to sales at Nordstrom. Cash flows arising from the use of Nordstrom Visa credit cards outside of our stores are treated as an investing activity within the Consolidated Statements of Cash Flows, as they represent loans made to our customers for purchases at third parties.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What type of nanostructured material works notably well to build gas nanosensors ?", - "target_page": 1, - "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nIn summary, we have presented a general model of nanostructured chemical sensors which takes the adsorption energies of the relevant chemical species and their individual scattering resistances as the only input. On the basis of this model we have performed a computational screening of transition metal doped CNTs, and found that Ni-doped CNTs are promising candidates for detecting CO in a background of air. The model may be applied straightforwardly to other nanostructures than CNTs, other functionalizations than metal doping and other gas compositions than air.\nThe authors acknowledge financial support from Spanish MEC (FIS2007-65702-C02-01), 'Grupos Consolidados UPV/EHU del Gobierno Vasco' (IT-319-07), e-I3 ETSF project (Contract Number 211956), 'Red Espa˜nola de Supercomputaci'on', NABIIT and the Danish Center for Scientific Computing. The Center for Atomic-scale Materials Design (CAMD) is sponsored by the Lundbeck Foundation. JMG-L acknowledges funding from Spanish MICINN through Juan de la Cierva and Jos'e Castillejo programs.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nThe ability to detect small concentrations of specific chemical species is fundamental for a variety of industrial and scientific processes as well as for medical applications and environmental monitoring [1]. In general, nanostructured materials should be well suited for sensor applications because of their large surface to volume ratio which makes them sensitive to molecular adsorption. Specifically, carbon nanotubes (CNT) [2] have been shown to work remarkably well as detectors of small gas molecules. This has been demonstrated both for individual CNTs [3-8] as well as for CNT networks [9, 10].\nPristine CNTs are known to be chemically inert - a property closely related to their high stability. As a consequence, only radicals bind strong enough to the CNT to notably affect its electrical properties [2, 5, 11-13]. To make CNTs attractive for sensor applications thus requires some kind of functionalization, e.g. through doping or decoration of the CNT sidewall [13-21]. Ideally, this type of functionalization could be used to control not only the reactivity of the CNT but also the selectivity towards specific chemical species.\nIn this work we consider the possibility of using CNTs doped by 3d transition metal atoms for chemical gas sensing. We use computational screening to systematically identify the most promising dopant candidates for detection of three different target molecules (CO, NH3, H2S) under typical atmospheric conditions. The screening procedure is based on the calculation of two microscopic descriptors: the binding energy and scattering resistance of the molecules when adsorbed on a doped CNT. These two quantities give a good indication of the gas coverage and impact on the resistance. For the most promising candidates we then employ a simple thermodynamic model of the CNT sensor. In this model, the binding energies are used to obtain the fractional coverage of the metallic sites as a function of the target molecule concentration under ambient conditions. Under the assumption of transport in the diffusive rather than localization regime, the\nchange in CNT resistivity may then be obtained from the calculated coverages and single impurity conductances.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nJ. M. Garc´ıa-Lastra 1,2 , ∗ D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 1 Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain 2 Center for Atomic-scale Materials Design, Department of Physics, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark 3 Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany\nWe use computational screening to systematically investigate the use of transition metal doped carbon nanotubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components of air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal atom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promising dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites in thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function of the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to Ni-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\nPACS numbers: 73.63.-b, 68.43.-h, 73.50.Lw", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n∗ Electronic address: juanmaria.garcia@ehu.es\n[1] Gas Sensing Materials, MRS Bull. , vol. 24 (1999).\n[2] J. C. Chalier, X. Blase, and S. Roche, 'Electronic and transport properties of nanotubes', Rev. Mod. Phys. 79 (2), 677 (May 2007), doi:10.1103/RevModPhys.79.677.\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, K. Cho, and H. Dai, 'Nanotube molecular wires as chemical sensors', Science 287 (5453), 622 (Jan. 2000), doi:10.1126/science.287.5453.622.\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, 'Extreme oxygen sensitivity of electronic properties of carbon nanotubes', Science 287 (5459), 1801 (Mar. 2000), doi:10.1126/science.287.5459.1801.\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, Integration and Applications (Wiley-VCH, Weinheim, 2008).\n[6] F. Villalpando-P'aez, A. H. Romero, E. Mu˜noz-Sandoval, L. M. Mart'ınez, H. Terrones, and M. Terrones, 'Fabrication of vapor and gas sensors using films of aligned CN x nanotubes', Chem. Phys. Lett. 386 (1-3), 137 (Mar. 2004), doi:10.1016/j.cplett.2004.01.052.\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R. da Silva, 'Designing real nanotube-based gas sensors', Phys. Rev. Lett. 100 (17), 176803 (May 2008), doi:10.1103/PhysRevLett.100.176803.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, 'Tailoring gas sensing properties of carbon nanotubes', J. Appl. Phys. 104 (2), 024502 (Jul. 2008), doi:10.1063/1.2956395.\n[9] C. Morgan, Z. Alemipour, and M. Baxendale, 'Variable range hopping in oxygen-exposed single-wall carbon nanotube networks', Phys. Stat. Solidi A 205 (6), 1394 (May 2008), doi:10.1002/pssa.200778113.\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, 'Influence of O2 and N2 on the conductivity of carbon nanotube networks', Phys. Rev. B 79 (19), 195431 (May 2009), doi:10.1103/PhysRevB.79.195431.\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, L. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, 'Role of defects on the gas sensing properties of carbon nanotubes thin films: experiment and theory', Chem. Phys. Lett. 387 (4-6), 356 (Apr. 2004), doi:10.1016/j.cplett.2004.02.038.\n[12] Z. Zanolli and J.-C. Charlier, 'Defective carbon nanotubes for single-molecule sensing', Phys. Rev. B 80 (15), 155447 (Oct. 2009), doi:10.1103/PhysRevB.80.155447.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[18] C. S. Yeung, L. V. Liu, and Y. A. Wang, 'Adsorption of small gas molecules onto Pt-doped single-walled carbon nanotubes', J. Phys. Chem. C 112 (19), 7401 (Apr. 2008), doi:10.1021/jp0753981.\n[19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, 'Structures, interactions, and ferromagnetism of Fe-carbon nanotube systems', J. Phys. Chem. C 112 (22), 400 (May 2008), doi:10.1021/jp0761968.\n[20] J. A. Furst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, ' Ab initio study of spin-dependent transport in carbon nanotubes with iron and vanadium adatoms', Phys. Rev. B 78 (19), 195405 (Nov. 2008), doi:10.1103/PhysRevB.78.195405.\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, P. Pyykko, and R. M. Nieminen, 'Embedding transitionmetal atoms in graphene: Structure, bonding, and magnetism', Phys. Rev. Lett. 102 (12), 126807 (Mar. 2009), doi:10.1103/PhysRevLett.102.126807.\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, 'Real-space grid implementation of the projector augmented wave method', Phys. Rev. B 71 (3), 035109 (Jan. 2005), doi:10.1103/PhysRevB.71.035109.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe find that oxidation of the active metal site passivates the sensor in the case of doping by Ti, V, Cr, and Mn under standard conditions (room temperature and 1 bar of pressure). Among the remaining metals, we identify Ni as is the most promising candidate for CO detection. For this system the change in resistance per active site is generally significant ( > 1 Ω ) for small changes in CO concentration in the relevant range of around 0.1-10 ppm. Our approach is quite general and is directly applicable to other nanostructures than CNTs, other functionalizations than metal doping, and other backgrounds than atmospheric air.\nAll total energy calculations and structure optimizations have been performed with the real-space density functional theory (DFT) code GPAW [22] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for representing the density and wave functions and the PBE exchange correlation functional [23]. Transport calculations for the optimized structures have been performed using the nonequilibrium Green's function method [24] with an electronic Hamiltonian obtained from the SIESTA code [25] in a double zeta polarized (DZP) basis set. Spin polarization has been taken into account in all calculations.\nMetallic doping of a (6,6) CNT has been modeled in a supercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A × 15 ˚ A × 14.622 ˚ A). For this size of supercell a �� -point sampling of the Brillouin zone was found to be sufficient. The formation energy for creating a vacancy (VC) occupied by a transition metal atom (M) was calculated using the relation\nE form [ M @ VC ] = E [ M @ VC ] + nE [ C ] -E [ M@NT ] (1)\nwhere E [M@VC] is the total energy of a transition metal atom occupying a vacancy in the nanotube, n is the number of carbon atoms removed to form the vacancy, E [C] is the energy per carbon atom in a pristine nanotube, and E [M@NT]\n2", - "page_start": 0, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\ning theory put into practice: First-principles modeling of transport in doped silicon wires', Phys. Rev. Lett. 99 (7), 076803 (Aug. 2007), doi:10.1103/PhysRevLett.99.076803.\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, W.-J. Chun, Y. Koike, and K. Asakura, 'X-ray absorption fine structure (XAFS) analyses of Ni species trapped in graphene sheet of carbon nanofibers', Phys. Rev. B 73 (14), 144103 (Apr. 2006), doi:10.1103/PhysRevB.73.144103.\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, F. J. Garcia-Vidal, A. Rubio, and F. Flores, 'Tuning the conductance of single-walled carbon nanotubes by ion irradiation in the Anderson localization regime', Nature Materials 4 , 534 (Jun. 2005), doi:10.1038/nmat1414.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 1: Structural schematics and formation energy for a 3d transition metal occupied monovacancy (black), divacancy I (gray), or divacancy II (white) in a (6,6) carbon nanotube. Formation energies of the empty vacancies are indicated by dashed lines.\nis the total energy of the pristine nanotube with a physisorbed transition metal atom. We have considered the monovacancy and two divacancies shown in Fig. 1. The energy required to form an empty vacancy is obtained from\nE form [ VC ] = E [ VC ] + nE [ C ] -E [ NT ] , (2)\nwhere E [VC] is the total energy of the nanotube with a vacancy of n atoms.\nThe calculated formation energies for the 3d transition metals are shown in Fig. 1. From the horizontal lines we see that both divacancies are more stable than the monovacancy. This may be attributed to the presence of a two-fold coordinated C atom in the monovacancy, while all C atoms remain three-fold coordinated in the divacancies. When a transition metal atom occupies a vacancy, the strongest bonding to the C atoms is through its d orbitals [26]. For this reason, Cu and Zn, which both have filled d-bands, are rather unstable in the CNT. For the remaining metals, adsorption in the monovacancies leads to quite stable structures. This is because the three-fold coordination of the C atoms and the CNT's hexagonal structure are recovered when the metal atom is inserted. On the other hand, metal adsorption in divacancies is slightly less stable because of the resulting pentagon defects, see upper panel in Fig. 1. A similar behaviour has been reported by Krasheninnikov et al. for transition metal atoms in graphene [21].\nThe adsorption energies for N2, O2, H2O, CO, NH3, and H2S on the metallic site of the doped (6,6) CNTs are shown in Fig. 2(a). The adsorption energy of a molecule X is defined by\nE ads [ X @M@VC ] = E [ X @M@VC ] -E [ X ] -E [ M@VC ] , (3)", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[13] J. M. Garc'ıa-Lastra, K. S. Thygesen, M. Strange, and ' Angel Rubio, 'Conductance of sidewall-functionalized carbon nanotubes: Universal dependence on adsorption sites', Phys. Rev. Lett. 101 (23), 236806 (Dec. 2008), doi:10.1103/PhysRevLett.101.236806.\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, ' Ab initio study of an iron atom interacting with single-wall carbon nanotubes', Phys. Rev. B 67 (20), 205414 (May 2003), doi:10.1103/PhysRevB.67.205414.\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, and Y. Kawazoe, 'Stable geometries and magnetic properties of single-walled carbon nanotubes doped with 3 d transition metals: A first-principles study', Phys. Rev. B 69 (7), 075414 (Feb 2004), doi:10.1103/PhysRevB.69.075414.\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and J. K. Kang, 'Interaction of a transition metal atom with intrinsic defects in single-walled carbon nanotubes', J. Phys. Chem. B 110 (28), 13941 (Jun. 2006), doi:10.1021/jp061895q.\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, 'First-principles study of metal adatom adsorption on graphene', Phys. Rev. B 77 , 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What seems to be a great technique to ensure vacancies are formed in carbon nanotubes (CNT) ?", - "target_page": 4, - "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nThe ability to detect small concentrations of specific chemical species is fundamental for a variety of industrial and scientific processes as well as for medical applications and environmental monitoring [1]. In general, nanostructured materials should be well suited for sensor applications because of their large surface to volume ratio which makes them sensitive to molecular adsorption. Specifically, carbon nanotubes (CNT) [2] have been shown to work remarkably well as detectors of small gas molecules. This has been demonstrated both for individual CNTs [3-8] as well as for CNT networks [9, 10].\nPristine CNTs are known to be chemically inert - a property closely related to their high stability. As a consequence, only radicals bind strong enough to the CNT to notably affect its electrical properties [2, 5, 11-13]. To make CNTs attractive for sensor applications thus requires some kind of functionalization, e.g. through doping or decoration of the CNT sidewall [13-21]. Ideally, this type of functionalization could be used to control not only the reactivity of the CNT but also the selectivity towards specific chemical species.\nIn this work we consider the possibility of using CNTs doped by 3d transition metal atoms for chemical gas sensing. We use computational screening to systematically identify the most promising dopant candidates for detection of three different target molecules (CO, NH3, H2S) under typical atmospheric conditions. The screening procedure is based on the calculation of two microscopic descriptors: the binding energy and scattering resistance of the molecules when adsorbed on a doped CNT. These two quantities give a good indication of the gas coverage and impact on the resistance. For the most promising candidates we then employ a simple thermodynamic model of the CNT sensor. In this model, the binding energies are used to obtain the fractional coverage of the metallic sites as a function of the target molecule concentration under ambient conditions. Under the assumption of transport in the diffusive rather than localization regime, the\nchange in CNT resistivity may then be obtained from the calculated coverages and single impurity conductances.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 1: Structural schematics and formation energy for a 3d transition metal occupied monovacancy (black), divacancy I (gray), or divacancy II (white) in a (6,6) carbon nanotube. Formation energies of the empty vacancies are indicated by dashed lines.\nis the total energy of the pristine nanotube with a physisorbed transition metal atom. We have considered the monovacancy and two divacancies shown in Fig. 1. The energy required to form an empty vacancy is obtained from\nE form [ VC ] = E [ VC ] + nE [ C ] -E [ NT ] , (2)\nwhere E [VC] is the total energy of the nanotube with a vacancy of n atoms.\nThe calculated formation energies for the 3d transition metals are shown in Fig. 1. From the horizontal lines we see that both divacancies are more stable than the monovacancy. This may be attributed to the presence of a two-fold coordinated C atom in the monovacancy, while all C atoms remain three-fold coordinated in the divacancies. When a transition metal atom occupies a vacancy, the strongest bonding to the C atoms is through its d orbitals [26]. For this reason, Cu and Zn, which both have filled d-bands, are rather unstable in the CNT. For the remaining metals, adsorption in the monovacancies leads to quite stable structures. This is because the three-fold coordination of the C atoms and the CNT's hexagonal structure are recovered when the metal atom is inserted. On the other hand, metal adsorption in divacancies is slightly less stable because of the resulting pentagon defects, see upper panel in Fig. 1. A similar behaviour has been reported by Krasheninnikov et al. for transition metal atoms in graphene [21].\nThe adsorption energies for N2, O2, H2O, CO, NH3, and H2S on the metallic site of the doped (6,6) CNTs are shown in Fig. 2(a). The adsorption energy of a molecule X is defined by\nE ads [ X @M@VC ] = E [ X @M@VC ] -E [ X ] -E [ M@VC ] , (3)", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe find that oxidation of the active metal site passivates the sensor in the case of doping by Ti, V, Cr, and Mn under standard conditions (room temperature and 1 bar of pressure). Among the remaining metals, we identify Ni as is the most promising candidate for CO detection. For this system the change in resistance per active site is generally significant ( > 1 Ω ) for small changes in CO concentration in the relevant range of around 0.1-10 ppm. Our approach is quite general and is directly applicable to other nanostructures than CNTs, other functionalizations than metal doping, and other backgrounds than atmospheric air.\nAll total energy calculations and structure optimizations have been performed with the real-space density functional theory (DFT) code GPAW [22] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for representing the density and wave functions and the PBE exchange correlation functional [23]. Transport calculations for the optimized structures have been performed using the nonequilibrium Green's function method [24] with an electronic Hamiltonian obtained from the SIESTA code [25] in a double zeta polarized (DZP) basis set. Spin polarization has been taken into account in all calculations.\nMetallic doping of a (6,6) CNT has been modeled in a supercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A × 15 ˚ A × 14.622 ˚ A). For this size of supercell a Γ -point sampling of the Brillouin zone was found to be sufficient. The formation energy for creating a vacancy (VC) occupied by a transition metal atom (M) was calculated using the relation\nE form [ M @ VC ] = E [ M @ VC ] + nE [ C ] -E [ M@NT ] (1)\nwhere E [M@VC] is the total energy of a transition metal atom occupying a vacancy in the nanotube, n is the number of carbon atoms removed to form the vacancy, E [C] is the energy per carbon atom in a pristine nanotube, and E [M@NT]\n2", - "page_start": 0, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nIn summary, we have presented a general model of nanostructured chemical sensors which takes the adsorption energies of the relevant chemical species and their individual scattering resistances as the only input. On the basis of this model we have performed a computational screening of transition metal doped CNTs, and found that Ni-doped CNTs are promising candidates for detecting CO in a background of air. The model may be applied straightforwardly to other nanostructures than CNTs, other functionalizations than metal doping and other gas compositions than air.\nThe authors acknowledge financial support from Spanish MEC (FIS2007-65702-C02-01), 'Grupos Consolidados UPV/EHU del Gobierno Vasco' (IT-319-07), e-I3 ETSF project (Contract Number 211956), 'Red Espa˜nola de Supercomputaci'on', NABIIT and the Danish Center for Scientific Computing. The Center for Atomic-scale Materials Design (CAMD) is sponsored by the Lundbeck Foundation. JMG-L acknowledges funding from Spanish MICINN through Juan de la Cierva and Jos'e Castillejo programs.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nJ. M. Garc´ıa-Lastra 1,2 , ∗ D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 1 Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain 2 Center for Atomic-scale Materials Design, Department of Physics, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark 3 Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany\nWe use computational screening to systematically investigate the use of transition metal doped carbon nanotubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components of air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal atom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promising dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites in thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function of the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to Ni-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\nPACS numbers: 73.63.-b, 68.43.-h, 73.50.Lw", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nTo estimate the effect of adsorbates on the electrical conductance of doped CNTs, we first consider the change in conductance when a single molecule is adsorbed on a metal site of an otherwise pristine CNT. In Fig. 2(b) we show the calculated change in conductance relative to the metal site with no adsorbate. In contrast to the binding energies, there are no clear trends in the conductances. The sensitivity of the conductance is perhaps most clearly demonstrated by the absence of correlation between different types of vacancies, i.e. between the three panels in Fig. 2(b). Close to the Fermi level, the conductance of a perfect armchair CNT equals 2 G 0 . The presence of the metal dopant leads to several dips in the transmission function known as Fano antiresonances [20]. The position and shape of these dips depend on the d -levels of the transition metal atom, the character of its bonding to the CNT, and is further affected by the presence of the adsorbate molecule. The coupling of all these factors is very complex and makes it difficult to estimate or rationalize the value of the conductance. For the spin polarized cases, we use the spin-averaged\n3\nconductances, i.e. G = ( G ↑ + G ↓ ) / 2.\nNext, we estimate the resistance of a CNT containing several impurities (a specific metal dopant with different molecular adsorbates). Under the assumption that the electron phasecoherence length, l φ , is smaller than the average distance between the dopants, d , we may neglect quantum interference and obtain the total resistance by adding the scattering resistances due to each impurity separately. The scattering resistance due to a single impurity is given by\nR s ( X ) = 1 /G ( X ) -1 / ( 2 G 0 ) , (6)\nwhere G ( X ) is the Landauer conductance of the pristine CNT with a single metal dopant occupied by molecule X and 1 / ( 2 G 0 ) is the contact resistance of a (6,6) CNT.\nWe may now obtain the total resistance per dopant site relative to the reference background signal as a function of the target molecule concentration", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, 'Tailoring gas sensing properties of carbon nanotubes', J. Appl. Phys. 104 (2), 024502 (Jul. 2008), doi:10.1063/1.2956395.\n[9] C. Morgan, Z. Alemipour, and M. Baxendale, 'Variable range hopping in oxygen-exposed single-wall carbon nanotube networks', Phys. Stat. Solidi A 205 (6), 1394 (May 2008), doi:10.1002/pssa.200778113.\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, 'Influence of O2 and N2 on the conductivity of carbon nanotube networks', Phys. Rev. B 79 (19), 195431 (May 2009), doi:10.1103/PhysRevB.79.195431.\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, L. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, 'Role of defects on the gas sensing properties of carbon nanotubes thin films: experiment and theory', Chem. Phys. Lett. 387 (4-6), 356 (Apr. 2004), doi:10.1016/j.cplett.2004.02.038.\n[12] Z. Zanolli and J.-C. Charlier, 'Defective carbon nanotubes for single-molecule sensing', Phys. Rev. B 80 (15), 155447 (Oct. 2009), doi:10.1103/PhysRevB.80.155447.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nTwo different procedures are employed for the deposition of the solution on to the substrate: spincoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the evaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds that directly after deposition, evaporation competes with dewetting until all the solvent has evaporated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For spin-coated films, the evaporation rate is high and structuring is normally finished before the spincoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing the meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by the solvent. This allows for a better control of the process and enables the use of contrast-enhanced microscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the region of the receding contact line of toluene, silicon and air. With both techniques one may find mono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched patterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a more controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the interaction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold cores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar concentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ). For even longer chains (C 14 ), however, one again finds less branching. It also depends on the amount of excess thiol in the solvent (for details see Ref. [40]).", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[18] C. S. Yeung, L. V. Liu, and Y. A. Wang, 'Adsorption of small gas molecules onto Pt-doped single-walled carbon nanotubes', J. Phys. Chem. C 112 (19), 7401 (Apr. 2008), doi:10.1021/jp0753981.\n[19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, 'Structures, interactions, and ferromagnetism of Fe-carbon nanotube systems', J. Phys. Chem. C 112 (22), 400 (May 2008), doi:10.1021/jp0761968.\n[20] J. A. Furst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, ' Ab initio study of spin-dependent transport in carbon nanotubes with iron and vanadium adatoms', Phys. Rev. B 78 (19), 195405 (Nov. 2008), doi:10.1103/PhysRevB.78.195405.\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, P. Pyykko, and R. M. Nieminen, 'Embedding transitionmetal atoms in graphene: Structure, bonding, and magnetism', Phys. Rev. Lett. 102 (12), 126807 (Mar. 2009), doi:10.1103/PhysRevLett.102.126807.\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, 'Real-space grid implementation of the projector augmented wave method', Phys. Rev. B 71 (3), 035109 (Jan. 2005), doi:10.1103/PhysRevB.71.035109.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe now return to the discussion of the validity of Eq. (7). As mentioned, the series coupling of individual scatterers should be valid when l φ < d . However, even for l φ > d and assuming that the Anderson localization length, l loc in the system exceeds l φ , Eq. (7) remains valid if one replaces the actual resistance R by the sample averaged resistance 〈 R 〉 [29]. At room temperature under ambient conditions, interactions with external degrees of freedom such as internal CNT phonons and vibrational modes of the adsorbed molecules would rapidly randomize the phase of the electrons. Therefore Eq. (7) should certainly be valid in the limit of low doping concentrations. On the other hand, the total number of dopants, N , should be large enough for the statistical treatment of the coverage to hold. Finally, we stress that Eq. (7) represents a conservative estimate of the change in resistance. In fact, in the regime where l φ > l loc, i.e. in the Anderson localization regime, the resistance would be highly sensitive to changes in the fractional coverage of active sites. Calculation of the actual resistance of the CNT in this regime would, however, involve a full transport calculation in the presence of\n4\nall N impurities. At this point it suffices to see that the conservative estimates obtained from Eq. (7) predict measurable signals in response to small changes in concentration of the target molecules.\nTo our knowledge, controlled doping of CNTs with transition metal atoms has so far not been achieved. It has, however, been found that metal atoms incorporated into the CNT lattice during catalytic growth are afterwards very difficult to remove [30]. Furthermore, it has been shown that CNT vacancies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ions [31]. This suggests that metallic doping of CNTs should be possible.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.2538.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "How many employees did HON Industries count in 2003 ?", - "target_page": 15, - "target_passage": "Members (employees) at year-end : 8,926", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SUBSIDIARIES\nDavid C. Burdakin\nExecutive Vice President, HON INDUSTRIES, Inc.\nPresident, The HON Company", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Stan A. Askren\nPresident, HON INDUSTRIES Inc.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Jack D. Michaels\nChairman and Chief Executive Officer, HON INDUSTRIES Inc.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "HON INDUSTRIES INC. OFFICERS\nJack D. Michaels\nChairman and Chief Executive Officer", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "afkljdf aojvoaipddddS EEKING I N V E S T O R S FOR A PERFECT MATCH\nJoin us in the dynamic, aggressive, profitable growth of HON INDUSTRIES.\nTHE BEST IS YET TO COME!\nManagement's Discussion and Analysis … 32 Consolidated Financial Statements and Notes … 39 Eleven-Year Summary … 56 Reports of Independent Auditors … 58 A Message from the Board of Directors … 61 Board of Directors and Officers … 62\nHON INDUSTRIES Inc. and SUBSIDIARIES", - "page_start": 30, - "page_end": 31, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Employees\nAs of October 25, 2003, the Company had over 16,000 active employees.\n(d)\nExecutive Officers of the Registrant", - "page_start": 4, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Richard H. Stanley\nVice Chairman, HON INDUSTRIES Inc.\nChairman, SC Companies, Inc.\nChairman, Stanley Consultants, Inc.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Sincerely,\nThe HON INDUSTRIES Board of Directors\nStan A. Askren\nGary M. Christensen\nCheryl A. Francis\nRobert L. Katz\nDennis J. Martin\nJack D. Michaels\nJoseph Scalzo\nAbbie J. Smith\nRichard H. Stanley\nBrian E. Stern\nRonald V. Waters, III\n61\nHON INDUSTRIES Inc. and SUBSIDIARIES", - "page_start": 60, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "HIGHLIGHTS/AWARDS:\n· Gave the Empower ® product line a complete makeover; including a new trim design, segmented panels, and redesigned storage cabinets.\nWWW.MAXONFURNITURE.COM\nHolga Inc. provides filing and storage solutions to contract, commercial, and institutional markets. Signature products include high-density shelving and mobile storage systems designed for efficient space utilization. Holga also offer a broad range of traditional metal filing and storage products.\n· Introduced 8000 Series Stackable Storage units, which provide a wide array of customizable storage options within a standard platform. The Series complements our new 8000 Series Pedestals, which offer a unique interlocking system and end tab filing capabilities.\nWWW.HOLGA.COM\n29\nHON International Inc. is responsible for HON INDUSTRIES' sales and business development outside the United States and Canada. Our members in local countries market the HON INDUSTRIES' brands through a global distribution network. With an extensive product selection, HON International is able to provide dealers and customers with the widest collection of 'compelling value' office furniture in the world. The international team is dedicated to providing customers with worldclass service, from initial inquiry to complete-and-on-time installation. Extensive international experience helps to ensure customers are provided with solutions for even their most challenging international needs and opportunities.\n· A lead exhibitor in the first-ever Office Furniture Expo in Mexico City.\n· Successfully completed projects for key multinational accounts in Ireland, Barbados,\nJamaica, Egypt, and Hong Kong, among others.\n· Opened the first HON INDUSTRIES' showroom outside the United States in Monterrey, Mexico.\nWWW.HONINTERNATIONAL.COM\nHON INDUSTRIES 2003", - "page_start": 28, - "page_end": 29, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "I NVESTOR RELATIONS\nSend inquiries to:\nInvestor Relations\nHON INDUSTRIES Inc.\n414 East Third Street\nMuscatine, IA 52761\nTelephone: 563.264.7400\nFax: 563.264.7655\nE-mail: investorrelations@honi.com", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "Did automating the writing of EM-to-IP handoffs notes using LLM lead to life-threatening outputs ?", - "target_page": 8, - "target_passage": "none of the incorrect output text elements reached life-threatening risk", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "Discussion\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, pretrained LLM and rule-based approaches within an end user-developed note template. It is important to note that (largely due to time constraints within the EM care delivery model) the performance of EM-to-IP handoff notes was not the current standard of care in EM. The study site's unique electronic handoff process enabled a comparison between physician-written and LLM-generated handoff notes. Traditional automated evaluations of the model output suggested\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "KeyPoints\nQuestion Can a large language model (LLM) generate emergency medicine (EM)-to-inpatient (IP) handoff notes that are useful and safe for EM care?\nFindings In this cohort study of 1600 EMpatient medical records using a novel evaluation framework, the LLM-generated EM-to-IP handoff notes had a mean usefulness of 4.04 out of 5 (compared with 4.36 for physician-written) and a mean patient safety of 4.06 out of 5 (compared with 4.50 for physician-written) with no critical patient safety risks.\nMeaning These findings suggest the value of a manual, patient safetyfocused clinical evaluation of LLM models and the potential of LLM-generated handoff notes to create a new standard of care in EM.\n+\nInvited Commentary", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "Abstract\nIMPORTANCE An emergency medicine (EM) handoff note generated by a large language model (LLM) has the potential to reduce physician documentation burden without compromising the safety of EM-to-inpatient (IP) handoffs.\nOBJECTIVE To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and safety compared with physician-written notes.\nDESIGN, SETTING, AND PARTICIPANTS This cohort study used EM patient medical records with acute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical Center. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated EM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented understudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers score [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) and a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written notes were compared. Data were analyzed from October 2023 to March 2024.\nEXPOSURE LLM-generated EM handoff notes.\nMAINOUTCOMESANDMEASURES LLM-generated handoff notes were evaluated for (1) lexical similarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with respect to source notes using SCALE; and (3) readability, completeness, curation, correctness, usefulness, and implications for patient safety using a novel framework.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "Introduction\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint Commission, the Accreditation Council for Graduate Medical Education, and the Association of American Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality handoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The EM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly adhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with adverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high risk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EMelectronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal medicine leadership of the study site collaboratively developed and launched a mandatory, EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for realtime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal evaluation of new EM-to-IP handoff notes through random medical record review and unstructured clinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of the handoff notes.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "Introduction\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nevaluation frameworks may not address the anticipated effect LLM performance limitations could have on patient safety. 38-41\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate the outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care rendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP handoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in Supplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and unstructured EHR data from the ED encounter to summarize the patient's ED care. We improved the correctness of model generations and customized the summaries in a structured format designed by a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel patient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes' quality and accuracy and the downstream patient safety implications of any identified inaccuracies. To evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting physician-written EM-to-IP handoff notes as the active control, using both the proposed patient safety-focused clinical evaluation framework and automated benchmark-driven methods. We used the physician-written EM-to-IP handoff notes as the active control and used the scores from both evaluation frameworks for the margin of inferiority of the intervention.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "Conclusions\nThis study's results suggest promise for future thoughtful integration of LLM-generated EM-to-IP handoff notes into clinical admission workflows, as well as the associated potential downstream quality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective preimplementation strategy to measure potential patient safety implications of incorrectness identified in LLM-generated clinical care summaries, which will guide future model refinement and implementation strategies. In the absence of a current written standard of care in EM, this innovation could represent a transformative advancement in the quality of EM-to-IP transitions of care.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed8.pdf" - }, - { - "text": "EM-to-IP Handoff Note Template\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff note structure used at the study site. The generated EM handoff note consists of components generated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult orders, and radiology impressions) and components generated by the trained abstractive summarization model (history of present illness [HPI], differential diagnoses, immediate care plans, in-ED events, and disposition). Each summary also included a header with the timestamp of ED triage and discharge, patient's birth date, patient's unique identifier, patient's encounter number, and the total time of patient's stay in the ED.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "Data Processing\nAs LLM 2 only has a context size of 4096 tokens, 44 weused 2 steps to process the EM notes to both shorten the input size while maintaining content salience. First, we adopted a number of heuristic strategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) time of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1-based saliency model to infer EM note sentences based on likelihood of content contribution to the EM-to-IP handoff notes.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\na Likert scores and score distributions over 50 notes for 3 annotators. There are no 1 ratings for either physician or AI summaries in the 150 evaluation results.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n7/12\nDownloaded from jamanetwork.com by guest on 01/13/2025\nJAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nsuperior performance. However, while the manual clinical evaluation demonstrated the majority of the LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on average, inferior to the clinician-written notes.\nOur novel clinical evaluation's findings suggest the majority of identified quality limitations and incorrectness would have minimal impact on patient safety, even when extrapolated to the worstcase scenario of the LLM-generated summary content not being reviewed and edited by a clinician before completion. This was designed to address contemporary LLM concerns of user trust, reliance and expertise. 49 As such, none of the incorrect output text elements reached life-threatening risk. However, incompleteness and faulty logic identified in the automated summaries were not always negligible, with just under 1 in 10 of these performance gaps determined to have the potential to create significant patient safety risk compared with the physician-written summaries. These critical implementation safety findings will inform (1) directionality of further model refinement; (2) further clinical evaluation of postrefinement model output; and (3) irrespective of downstream model performance, an EHR-implementation plan constrained to a user-interface design that will allow EM clinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see eAppendix 1 in Supplement 1). This physician-in-the-loop process has also been identified as critical in other recent work implementing LLMs into clinical workflows. 29,53", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed8.pdf" - }, - { - "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "How did automating the writing of EM-to-IP handoffs notes using LLM affect the usefulness of these notes ?", - "target_page": 1, - "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Discussion\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, pretrained LLM and rule-based approaches within an end user-developed note template. It is important to note that (largely due to time constraints within the EM care delivery model) the performance of EM-to-IP handoff notes was not the current standard of care in EM. The study site's unique electronic handoff process enabled a comparison between physician-written and LLM-generated handoff notes. Traditional automated evaluations of the model output suggested\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Abstract\nIMPORTANCE An emergency medicine (EM) handoff note generated by a large language model (LLM) has the potential to reduce physician documentation burden without compromising the safety of EM-to-inpatient (IP) handoffs.\nOBJECTIVE To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and safety compared with physician-written notes.\nDESIGN, SETTING, AND PARTICIPANTS This cohort study used EM patient medical records with acute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical Center. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated EM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented understudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers score [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) and a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written notes were compared. Data were analyzed from October 2023 to March 2024.\nEXPOSURE LLM-generated EM handoff notes.\nMAINOUTCOMESANDMEASURES LLM-generated handoff notes were evaluated for (1) lexical similarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with respect to source notes using SCALE; and (3) readability, completeness, curation, correctness, usefulness, and implications for patient safety using a novel framework.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "KeyPoints\nQuestion Can a large language model (LLM) generate emergency medicine (EM)-to-inpatient (IP) handoff notes that are useful and safe for EM care?\nFindings In this cohort study of 1600 EMpatient medical records using a novel evaluation framework, the LLM-generated EM-to-IP handoff notes had a mean usefulness of 4.04 out of 5 (compared with 4.36 for physician-written) and a mean patient safety of 4.06 out of 5 (compared with 4.50 for physician-written) with no critical patient safety risks.\nMeaning These findings suggest the value of a manual, patient safetyfocused clinical evaluation of LLM models and the potential of LLM-generated handoff notes to create a new standard of care in EM.\n+\nInvited Commentary", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "Introduction\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nevaluation frameworks may not address the anticipated effect LLM performance limitations could have on patient safety. 38-41\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate the outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care rendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP handoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in Supplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and unstructured EHR data from the ED encounter to summarize the patient's ED care. We improved the correctness of model generations and customized the summaries in a structured format designed by a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel patient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes' quality and accuracy and the downstream patient safety implications of any identified inaccuracies. To evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting physician-written EM-to-IP handoff notes as the active control, using both the proposed patient safety-focused clinical evaluation framework and automated benchmark-driven methods. We used the physician-written EM-to-IP handoff notes as the active control and used the scores from both evaluation frameworks for the margin of inferiority of the intervention.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "Introduction\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint Commission, the Accreditation Council for Graduate Medical Education, and the Association of American Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality handoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The EM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly adhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with adverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high risk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EMelectronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal medicine leadership of the study site collaboratively developed and launched a mandatory, EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for realtime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal evaluation of new EM-to-IP handoff notes through random medical record review and unstructured clinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of the handoff notes.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "Data Processing\nAs LLM 2 only has a context size of 4096 tokens, 44 weused 2 steps to process the EM notes to both shorten the input size while maintaining content salience. First, we adopted a number of heuristic strategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) time of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1-based saliency model to infer EM note sentences based on likelihood of content contribution to the EM-to-IP handoff notes.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "EM-to-IP Handoff Note Template\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff note structure used at the study site. The generated EM handoff note consists of components generated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult orders, and radiology impressions) and components generated by the trained abstractive summarization model (history of present illness [HPI], differential diagnoses, immediate care plans, in-ED events, and disposition). Each summary also included a header with the timestamp of ED triage and discharge, patient's birth date, patient's unique identifier, patient's encounter number, and the total time of patient's stay in the ED.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "Data Curation for Automated ED Note Generation\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rulebased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail in eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM physicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in Table 1 : EMclinician notes, consultation notes, EM progress note entries, and EM procedure notes. The EM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n3/12\nDownloaded from jamanetwork.com by guest on 01/13/2025\nJAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 board certified emergency medicine physician leaders with experience in formal quality and patient safety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and annotation. As the task of EM-handoff note generation is not dependent on racial characteristics of the patients, we removed all mentions of race during the annotation stage as a means to avoid race bias; therefore, the model was trained to generate text without race-based assumptions. Although resource intensive, a small and carefully curated dataset of at least 1000 examples has been shown to be sufficient to produce remarkable results for the language model chosen. 42 Given the size of our dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data placed in the training set and eschewed a validation set to lower the variance of the models. We used k-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter optimization of the LLMs.", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "Conclusions\nThis study's results suggest promise for future thoughtful integration of LLM-generated EM-to-IP handoff notes into clinical admission workflows, as well as the associated potential downstream quality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective preimplementation strategy to measure potential patient safety implications of incorrectness identified in LLM-generated clinical care summaries, which will guide future model refinement and implementation strategies. In the absence of a current written standard of care in EM, this innovation could represent a transformative advancement in the quality of EM-to-IP transitions of care.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed8.pdf" - }, - { - "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "What company released MegatronLM ?", - "target_page": 2, - "target_passage": "NVIDIA released the MegatronLM", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "2 BACKGROUND\nthe maximum development F1 score in 10 epochs as opposed to 486 without ELMo. This model furthermore achieved the same F1 score with 1% of the data as the baseline model achieved with 10% of the training data. Increasing the number of model parameters, however, did not yield noticeable increases for LSTMs [e.g. 82].\nTransformer models, on the other hand, have been able to continuously benefit from larger architectures and larger quantities of data. Devlin et al. [39] in particular noted that training on a large dataset and fine-tuning for specific tasks leads to strictly increasing results on the GLUE tasks [138] for English as the hyperparameters of the model were increased. Initially developed as Chinese LMs, the ERNIE family [130, 131, 145] produced ERNIE-Gen, which was also trained on the original (English) BERT dataset, joining the ranks of very large LMs. NVIDIA released the MegatronLM which has 8.3B parameters and was trained on 174GB of text from the English Wikipedia, OpenWebText, RealNews and CC-Stories datasets [122]. Trained on the same dataset, Microsoft released T-NLG, 1 an LM with 17B parameters. OpenAI's GPT-3 [25] and Google's GShard [73] and Switch-C [43] have increased the definition of large LM by orders of magnitude in terms of parameters at 175B, 600B, and 1.6T parameters, respectively. Table 1 summarizes a selection of these LMs in terms of training data size and parameters. As increasingly large amounts of text are collected from the web in datasets such as the Colossal Clean Crawled Corpus [107] and the Pile [51], this trend of increasingly large LMs can be expected to continue as long as they correlate with an increase in performance.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 9: Average performance of models per task category.\n0.30. all-MiniLM-L12-v2, A v erage = 0.51. all-MiniLM-L12-v2, BitextMining = 0.48. all-MiniLM-L12-v2, Classification = 0.52. all-MiniLM-L12-v2, Clustering = 0.34. all-MiniLM-L12-v2, P airClassification = 0.72. all-MiniLM-L12-v2, Reranking = 0.68. all-MiniLM-L12-v2, Retrie v al = 0.43. all-MiniLM-L12-v2, STS = 0.67. all-MiniLM-L12-v2, Summarization = 0.27. all-MiniLM-L6-v2, A v erage = 0.50. all-MiniLM-L6-v2, BitextMining = 0.40. all-MiniLM-L6-v2, Classification = 0.52. all-MiniLM-L6-v2, Clustering = 0.35. all-MiniLM-L6-v2, P airClassification = 0.71. all-MiniLM-L6-v2, Reranking = 0.65. all-MiniLM-L6-v2, Retrie v al = 0.38. all-MiniLM-L6-v2, STS = 0.68. all-MiniLM-L6-v2, Summarization = 0.28. distiluse-base-multilingual-cased-v2, A v erage = 0.60. distiluse-base-multilingual-cased-v2, BitextMining = 0.94. distiluse-base-multilingual-cased-v2, Classification = 0.64. distiluse-base-multilingual-cased-v2, Clustering = 0.39. distiluse-base-multilingual-cased-v2, P airClassification = 0.72. distiluse-base-multilingual-cased-v2, Reranking =", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 13: Performance of each model for Clustering.\n0.38. LaBSE, MasakhaNEWSP2P = 0.46. LaBSE, MLSUMS2S = 0.35. LaBSE, MLSUMP2P Clustering = 0.42. LaBSE, HALS2S = 0.25. LaBSE, AlloPr ofS2S = 0.32. LaBSE, AlloPr ofP2P = 0.55. all-MiniLM-L12-v2, MasakhaNEWSS2S = 0.32. all-MiniLM-L12-v2, MasakhaNEWSP2P = 0.43. all-MiniLM-L12-v2, MLSUMS2S = 0.29. all-MiniLM-L12-v2, MLSUMP2P Clustering = 0.34. all-MiniLM-L12-v2, HALS2S = 0.25. all-MiniLM-L12-v2, AlloPr ofS2S = 0.32. all-MiniLM-L12-v2, AlloPr ofP2P = 0.46. all-MiniLM-L6-v2, MasakhaNEWSS2S = 0.41. all-MiniLM-L6-v2, MasakhaNEWSP2P = 0.35. all-MiniLM-L6-v2, MLSUMS2S = 0.28. all-MiniLM-L6-v2, MLSUMP2P Clustering = 0.37. all-MiniLM-L6-v2, HALS2S = 0.23. all-MiniLM-L6-v2, AlloPr ofS2S = 0.32. all-MiniLM-L6-v2, AlloPr ofP2P = 0.52. distiluse-base-multilingual-cased-v2, MasakhaNEWSS2S = 0.33. distiluse-base-multilingual-cased-v2, MasakhaNEWSP2P = 0.54. distiluse-base-multilingual-cased-v2, MLSUMS2S = 0.35.", - "page_start": 24, - "page_end": 24, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 9: Average performance of models per task category.\n0.69. distiluse-base-multilingual-cased-v2, Retrie v al = 0.40. distiluse-base-multilingual-cased-v2, STS = 0.75. distiluse-base-multilingual-cased-v2, Summarization = 0.28. multi-qa-MiniLM-L6-cos-v1, A v erage = 0.49. multi-qa-MiniLM-L6-cos-v1, BitextMining = 0.38. multi-qa-MiniLM-L6-cos-v1, Classification = 0.51. multi-qa-MiniLM-L6-cos-v1, Clustering = 0.33. multi-qa-MiniLM-L6-cos-v1, P airClassification = 0.72. multi-qa-MiniLM-L6-cos-v1, Reranking = 0.64. multi-qa-MiniLM-L6-cos-v1, Retrie v al = 0.39. multi-qa-MiniLM-L6-cos-v1, STS = 0.67. multi-qa-MiniLM-L6-cos-v1, Summarization = 0.28. paraphrase-multilingual-MiniLM-L12-v2, A v erage = 0.60. paraphrase-multilingual-MiniLM-L12-v2, BitextMining = 0.93. paraphrase-multilingual-MiniLM-L12-v2, Classification = 0.60. paraphrase-multilingual-MiniLM-L12-v2, Clustering = 0.39. paraphrase-multilingual-MiniLM-L12-v2, P airClassification = 0.74. paraphrase-multilingual-MiniLM-L12-v2, Reranking = 0.68. paraphrase-multilingual-MiniLM-L12-v2, Retrie v al = 0.44.", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 12: Performance of each model for Bitext Mining, Semantic Textual Similarity (STS) and Summarization.\nall-MiniLM-L6-v2, STSBenchmarkMultilingual = 0.67. all-MiniLM-L12-v2 all-MiniLM-L6-v2, STS22 STS = 0.70. all-MiniLM-L12-v2 all-MiniLM-L6-v2, SICKFr = 0.63. all-MiniLM-L12-v2 all-MiniLM-L6-v2, SummEv alFr Summarization = 0.27. , Flor es_fr -en = 0.62. , Flor es_en-fr BitextMining = 0.56. , DiaBla_fr -en = 0.03. , STSBenchmarkMultilingual = 0.65. , STS22 STS = 0.77. , SICKFr = 0.62. , SummEv alFr Summarization = 0.28. distiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, Flor es_fr -en = 1.00. distiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, Flor es_en-fr BitextMining = 1.00. distiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, DiaBla_fr -en = 0.83. distiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, STSBenchmarkMultilingual = 0.77. distiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, STS22 STS = 0.76. distiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, SICKFr = 0.72.", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv4.pdf" - }, - { - "text": "HIGHLIGHTS/AWARDS:\n· Aggressive 2003 product launch of nine new seating lines: Amalfi TM , Valor TM , Porter TM , Tiara TM , Raffaella TM , Napoli TM , Sirmione TM , Fitzgerald TM , and Debonair TM .\n· Launched Mantra TM , a new modular and contemporary case good line. Using mixed materials - from wood to brushed aluminum and glass - the line focuses on the integration of technology into today's executive office environments.\n· The Amalfi TM line won the Silver Award at NeoCon.\n· Experienced record operational performance.\nWWW.GUNLOCKE.COM\n28\nThe HON Company is North America's leading manufacturer and marketer of office solutions for small and medium-sized workplaces. Its strong distribution channel of independent dealers, wholesalers, and retailers supports the broadest mid-market product offering in the industry.\n· Launched contemporary Perpetual ® collection targeting the 18- to 35-year-old segment.\n· 2003 Shingo Award for Excellence in Manufacturing.\n· Office Furniture Dealers Alliance (OFDA), 2003 Dealers' Choice Manufacturer of the Year, Best Support, Service, and Training, and Best Management.\n· General Services Administration's (GSA) 2003 'Evergreen Furniture and Furnishings Award' for environmental stewardship.\n· The Chicago Athenaeum: Museum of Architecture and Design Award for the Olson Flex Stacker TM Chair and Perpetual ® desking.\n· Buildings Magazine' s Innovations Award and Editor's Top 100 - Perpetual ® desking.\n· Today's Facilities Manager Readers' Choice Award - Non-task seating, storage, and conference room furnishings.\nWWW.HON.COM\nPaoli Inc. is a leading provider of wood case goods, modular desking, conference products, and seating through its well-known brands Paoli ® and Whitehall ® . Founded in 1926, it is the newest member of the HON INDUSTRIES family, acquired in January 2004. Outstanding product design at a great value makes Paoli a highly sought after solution in the market for wood private offices. Paoli's production capability and resources allow the company to respond quickly to changing market needs. Paoli's strong, independent representative sales and dealer networks support its broad product offering in the mid-market and contract furniture segments.\n· Introduced the Reflect TM product line of modular, traditional case goods in 2003.\n· Created CAP TM - a comprehensive family of library products designed to effectively furnish today's diverse learning environments and sports stadium suites.", - "page_start": 27, - "page_end": 28, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 13: Performance of each model for Clustering.\ndistiluse-base-multilingual-cased-v2, MLSUMP2P Clustering = 0.40. distiluse-base-multilingual-cased-v2, HALS2S = 0.22. distiluse-base-multilingual-cased-v2, AlloPr ofS2S = 0.35. distiluse-base-multilingual-cased-v2, AlloPr ofP2P = 0.56. multi-qa-MiniLM-L6-cos-v1, MasakhaNEWSS2S = 0.27. multi-qa-MiniLM-L6-cos-v1, MasakhaNEWSP2P = 0.54. multi-qa-MiniLM-L6-cos-v1, MLSUMS2S = 0.26. multi-qa-MiniLM-L6-cos-v1, MLSUMP2P Clustering = 0.35. multi-qa-MiniLM-L6-cos-v1, HALS2S = 0.14. multi-qa-MiniLM-L6-cos-v1, AlloPr ofS2S = 0.26. multi-qa-MiniLM-L6-cos-v1, AlloPr ofP2P = 0.49. paraphrase-multilingual-MiniLM-L12-v2, MasakhaNEWSS2S = 0.34. paraphrase-multilingual-MiniLM-L12-v2, MasakhaNEWSP2P = 0.37. paraphrase-multilingual-MiniLM-L12-v2, MLSUMS2S = 0.37. paraphrase-multilingual-MiniLM-L12-v2, MLSUMP2P Clustering = 0.40. paraphrase-multilingual-MiniLM-L12-v2, HALS2S = 0.30. paraphrase-multilingual-MiniLM-L12-v2, AlloPr ofS2S = 0.42. paraphrase-multilingual-MiniLM-L12-v2,", - "page_start": 24, - "page_end": 24, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 12: Performance of each model for Bitext Mining, Semantic Textual Similarity (STS) and Summarization.\ndistiluse-base-multilingual-cased-v2 multi-qa-MiniLM-L6-cos-v1, SummEv alFr Summarization = 0.28. paraphrase-multilingual-MiniLM-L12-v2, Flor es_fr -en = 0.55. paraphrase-multilingual-MiniLM-L12-v2, Flor es_en-fr BitextMining = 0.50. paraphrase-multilingual-MiniLM-L12-v2, DiaBla_fr -en = 0.09. paraphrase-multilingual-MiniLM-L12-v2, STSBenchmarkMultilingual = 0.64. paraphrase-multilingual-MiniLM-L12-v2, STS22 STS = 0.75. paraphrase-multilingual-MiniLM-L12-v2, SICKFr = 0.62. paraphrase-multilingual-MiniLM-L12-v2, SummEv alFr Summarization = 0.28. , Flor es_fr -en = 1.00. , Flor es_en-fr BitextMining = 1.00. , DiaBla_fr -en = 0.78. , STSBenchmarkMultilingual = 0.80. , STS22 STS = 0.71. , SICKFr = 0.75. , SummEv alFr Summarization = 0.29. paraphrase-multilingual-mpnet-base-v2, Flor es_fr -en = 1.00. paraphrase-multilingual-mpnet-base-v2, Flor es_en-fr BitextMining = 1.00. paraphrase-multilingual-mpnet-base-v2, DiaBla_fr -en = 0.81. paraphrase-multilingual-mpnet-base-v2, STSBenchmarkMultilingual = . paraphrase-multilingual-mpnet-base-v2, STS22 STS = . paraphrase-multilingual-mpnet-base-v2,", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv4.pdf" - }, - { - "text": "6. DRIVE FUTURE GROWTH OPPORTUNITIES\nContinue to develop targeted new growth areas of our business, including machine-to-machine (M2M) communications, mobile commerce and video, business communications services, local and digital media services, home automation and sports.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Energy Generation and Storage Demand, Production and Deployment\nThe long-term success of this business is dependent upon incremental volume growth. We continue to increase the production and capabilities of our energy storage products to meet high levels of demand, including the introduction of Powerwall 3 in 2024, the construction of a new Megafactory in Shanghai and the ongoing ramp at our Megafactory in Lathrop, California. For Megapack, energy storage deployments can vary meaningfully quarter to quarter depending on the timing of specific project milestones and logistics. As these product lines grow, we will have to maintain adequate battery cell supply for our energy storage products. At the same time, changes in government and economic incentives or tariffs may also impact our sales, cost structure and the competitive landscape.", - "page_start": 34, - "page_end": 34, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "What is the average emission of a human being per year in terms of CO2eq ?", - "target_page": 3, - "target_passage": "the average human is responsible for an estimated 5t CO2e per year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nEven when climate change and global warming shared concern about similar topics such as the cause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas climate change preferred a more in-depth perspective, highlighting the importance of global action to mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to carbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern [90], the two terminologies' di GLYPH<11> erences in connotations suggest that introducing these absent sub-topics into global warming discourse or highlighting climate change for its inherent connotations may help communicators raise public concern about climate.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.2. Association Network Analysis\nb\n)\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n10 of 22\nIn the global warming network, politics was the second-largest discourse cluster (20% of the network), where 'tcot', short for 'Top Conservatives on Twitter', was the node ranked highest, and 'p2', short for 'Progressives 2.0', is also included. Several political figures, such as Obama and Al Gore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster (16%), including both domestic e GLYPH<11> orts, such as 'us', 'trump', 'climatechangeisreal', 'climateaction', and 'epa', and two international items, like 'china' and 'india'. The fourth cluster (in blue) referred to emissions, including hashtags like 'co2', 'green', and 'carbon'. The smallest cluster (8%) was composed of 'snow', 'winter', 'heatwave', and 'summer', referring to the temperature abnormalities on the earth.", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "1. Introduction\nThe public's distinct understanding of the cause and e GLYPH<11> ect of the global climate issue is an obstacle to joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], previous studies noticed that the public had even failed to reach an agreement on whether 'climate change' or 'global warming' is the most appropriate definition of the global climate concern [3-5]. According to the definition provided by [6], global warming describes global climate issues as a continuous increase in the average temperature of Earth's surface due to anthropogenic emissions of greenhouse gases, whereas climate change includes not only temperature rise but also a range of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062; doi:10.3390 / ijerph17031062\nwww.mdpi.com / journal / ijerph\n/gid00001\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n2 of 22\ncomplex changes in the state of the climate [7], which may be caused by natural process, external forces, or human interventions [8]. By randomly assigning respondents to climate change or global warming questionnaires, scholars confirmed that the di GLYPH<11> erent connotations contained in the two definitions are likely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which may inhibit collaboration and joint e GLYPH<11> orts to mitigate the global challenge.\nPublic preference between climate change and global warming is even more apparent when considering the ideology spectrum [10]. Some scholars concluded that conservatives, who are less concerned with environmental issues, tended to use global warming as a narrative strategy because global warming has a more direct connection with temperature rise, making it easier to find contradictory cues such as freezing weather or heavy snowstorms to deny global climate change facts [11]. The associations between global warming and human activities may contribute to more controversies as well [12], connecting global warming more with the 'hoax' frame [5] and evoking greater negative sentiment [13].", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "References\n40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whit/field, S. & Das, B. Current warming will reduce yields unless maize breeding and seed systems adapt immediately. Nat. Clim. Change 6 , 954-958 (2016).\n41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the Southeastern US. Clim. Change 134 , 311-326 (2016).\n42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS 116 (10), 4194-4199 (2019).\n43. Urban, D. W., She/ffield, J. & Lobell, D. B. /T_he impacts of future climate and carbon dioxide changes on the average and variability of US maize yields under two emission scenarios. Environ. Res. Lett. 10 , 045003 (2015).\n44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C Above Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global Response to the /T_hreat of Climate Change, Sustainable Development, and E/fforts to Eradicate Poverty 32 (World Meteorological Organization, 2018).\n45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for gap-/filling and historical climate series estimation. Agr. For. Meteorol. 200 , 233-248 (2015).\n46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth Syst. Dyn. 4 , 219-236 (2013).\n47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological types, and net primary production in the year 2000. Glob. Biogeochem. Cycles 22 , 1022 (2008).", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - }, - { - "text": "Support for adoption of electric vehicles and car-sharing\nIn partnership with the Guangdong Provincial In partnership with the Guangdong Provincial Department of Science and Technology, the Department of Science and Technology, the Japan Research Institute also advises Japan Research Institute also advises government departments on system government departments on system establishment for new energy-saving establishment for new energy-saving businesses. Guangdong is China businesses. Guangdong is China's richest s richest province by gross provincial product, and province by gross provincial product, and here both needs and potential in the field here both needs and potential in the field of energy-saving are very great. The Japan of energy-saving are very great. The Japan Research Institute also supports industrial Research Institute also supports industrial restructuring and low-carbon projects in the restructuring and low-carbon projects in the province through model projects. province through model projects.\nIGEM2010 greeted many visitors\nIn the battle against global warming, both In the battle against global warming, both public and private sectors are facing mounting public and private sectors are facing mounting pressure to curb carbon dioxide pollution from pressure to curb carbon dioxide pollution from transportation, one of the major sources of transportation, one of the major sources of emissions. Against this backdrop, the Japan emissions. Against this backdrop, the Japan Research Institute is supporting environmental Research Institute is supporting environmental businesses that map out pathways and businesses that map out pathways and develop projects, tailored to the needs of develop projects, tailored to the needs of particular localities, to bring about a particular localities, to bring about a low-carbon society. Experimental projects are low-carbon society. Experimental projects are currently underway in Kanagawa Prefecture, currently underway in Kanagawa Prefecture, Saitama Prefecture, Kyoto and Sapporo. Saitama Prefecture, Kyoto and Sapporo. These initiatives are aimed at hastening the These initiatives are aimed at hastening the adoption of electric vehicles and car-sharing adoption of electric vehicles and car-sharing to cut carbon dioxide emissions. The Institute to cut carbon dioxide emissions. The Institute is working in cooperation with government is working in cooperation with government bodies, car-rental, commercial vehicle-leasing bodies, car-rental, commercial vehicle-leasing and parking-facility management companies, and parking-facility management companies, railways, communications providers and railways, communications providers and other entities. other entities.\nElectric vehicles not only emit no carbon dioxide, but offer a comfortable drive as well\nFor further details, please see our website.\nSumitomo Mitsui Financial Group CSR Report", - "page_start": 12, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Materials and methods\nFirstly, the period of 1986-2005 is de/fined as the baseline, of which the simulated average value is recognized as 0.61 °C above pre-industrial (the period of 1850-1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between di/fferent periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986-2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. /T_hirdly, the climate data of global warming by 1.5 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 1.5-2.0 °C above pre-industrial levels at the end of the twenty-/first century; the climate data of global warming by 2.0 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 2.0-2.5 °C above pre-industrial levels at the end of the twenty-/first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately con/firmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020-2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041-2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060-2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065-2084.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "4. Discussion\nbut also a result of the different forcings influencing the atmosphere model at the time of passing each GWL, and the interaction with the climate sensitivity of HadGEM3. The radiative forcing of non-CO 2 forcings has previously been highlighted as a potentially important influence on patterns of climate change at 1.5°C and 2°C global warming [39]. Furthermore, despite some differences in regional climate responses between ensemble members, there were also some remarkable consistencies especially in the changes that might be considered inconsistent with a warming climate, such as regions such as northern South America where heavy rainfall (Rx5day) decreases rather increasing as might be expected under a warming climate. Again, these consistencies point to some common forcing of all simulations.\nOne key factor is the different times of passing a particular GWL, because the net radiative forcing would be different even though the same emissions and concentration scenario was used in all simulations. A given GWL was reached at a different time in each ensemble member, so the CO2 and aerosol concentrations vary between ensemble members; in members reaching a GWL early, such as that driven by IPSL-CM5A-LR, the CO 2 concentration is relatively lower than in other members, and the total aerosol concentration would be relatively higher (CO 2 concentrations are projected to increase in RCP8.5, but aerosol concentrations are projected decline). The net radiative forcing is smaller, because in RCP8.5 the increase positive radiative forcing from CO 2 is greater than the decrease in net negative radiative forcing from aerosols. Moreover, the physiological effect of CO 2 is also smaller, meaning that the consequent reduction in transpiration and associated additional land surface warming influence would also be expected to be smaller.\nConversely, in members reaching the same GWL later, such as that driven by GFDL-ESM2M, CO 2 concentration is relatively higher, and aerosol concentrations are lower. So, net radiative forcing, CO 2 physiological effects and the regional-scale radiative forcings from individual aerosol types could, therefore, be quite different in the GFDL-driven HadGEM3 simulation when it reaches 2°C global warming 25 years later than the IPSL-CM5A-LR-driven simulation.", - "page_start": 23, - "page_end": 23, - "source_file": "pubmed11.pdf" - }, - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nClimate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting di GLYPH<11> erent aspects of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n13 of 22\nissues and re-constructing them di GLYPH<11> erently. By comparing the persistent words used related to the two discourses in the 10-year period in Table 2, we think that global warming showed a relative preference toward general descriptions or slogans, such as 'earth' and 'pollution', whereas 'climate change' was more associated to specific issues like 'solar', 'coal', 'china', and 'food'.\nStudies have suggested that the public shows a preference for scientific publications with general keywords compared with those with complicated scientific jargon [47], lacking a deep understanding of the complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions seem to suit global warming more than climate change according to the current study, which is probably because climate change receives more publicity and recognition than global warming in the scientific community. In the association network shown in Figure 2, global warming was found to be more connected with temperature abnormalities. This finding is in accordance with studies reporting that short-term temperature anomalies [87] can increase the public's belief about global warming by increasing the understanding of this abstract issue [88], although scientists mostly make judgments based on long-term weather statistics [89]. However, none of the four words, 'snow', 'summer', 'winter', or 'heatwave' in the temperature theme of global warming were ranked in the top 50 nodes list of the climate change network.", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nKuo Li ͷ * , Jie Pan ͷ , Wei Xiong ͸ , Wei Xie ͹ & Tariq Ali ͹\nClimate change is becoming more and more remarkable which has an obvious impact on crop yields all over the world. Future climate scenario data was simulated by ͻ climate models recommended by ISI-MIP under ͺ RCP scenarios, in which the approximate scenarios with global warming by ͷ.ͻ °C and ͸ °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the world under global warming by ͷ.ͻ °C and ͸.Ͷ °C were analyzed and the market prices of maize at national and global levels were simulated. The results showed that, the risk of maize yield reduction under ͸.Ͷ °C scenario was much more serious than ͷ.ͻ °C scenario; the ratios of yield changes were separately Ͷ.ͷ;% and - ͷͶ.;% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. The reduction trend of total maize production is obvious in the top five countries and the main producing regions of the world, especially under the ͸.Ͷ °C scenario. The market price of maize would increase by around Ͷ.ͽ% and ͹.ͺ% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. With the quickly increasing population in the world, it is urgent for all countries to pay enough attention to the risk of maize yield and take actions of mitigation and adaptation to climate change.\nIn the past hundred years, the global climate has experienced great changes 1-4 . According to the sixth assessment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and almost all regions in the world experienced surface warming 5 . Due to global warming, the extreme climate events become more and more frequent, and the ecological environment problems caused by climate change are more and more serious, which restrict the sustainable development of human society and health 6-10 . Global warming has gradually changed from a scienti/fic issue to a major social issue of common concern to governments and people of all countries 11-13 . In 2016, nearly 200 parties of the United Nations Framework Convention on climate change reached the Paris Agreement at the climate change conference in Paris 14 . Paris Agreement has indicated and pursue e/fforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "How did the Black Lives Matter movement influence the writing of Wikipedia articles ?", - "target_page": 5, - "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "4.2 Static Data/Changing Social Views\nA central aspect of social movement formation involves using language strategically to destabilize dominant narratives and call attention to underrepresented social perspectives. Social movements produce new norms, language, and ways of communicating. This adds challenges to the deployment of LMs, as methodologies reliant on LMs run the risk of 'value-lock', where the LM-reliant technology reifies older, less-inclusive understandings.\nFor instance, the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people increased in coverage and were generated with reduced latency [135]. Importantly, articles describing past shootings and incidents of police brutality were created and updated as articles for new events were created, reflecting how social movements make connections between events in time to form cohesive narratives [102]. More generally, Twyman et al. [135] highlight how social movements actively influence framings and reframings of minority narratives\n14 Available at https://github.com/LDNOOBW/List-of-Dirty-Naughty-Obscene-andOtherwise-Bad-Words/blob/master/en, accessed Jan 18, 2021\n15 This observation is due to William Agnew.\nin the type of online discourse that potentially forms the data that underpins LMs.\nAn important caveat is that social movements which are poorly documented and which do not receive significant media attention will not be captured at all. Media coverage can fail to cover protest events and social movements [41, 96] and can distort events that challenge state power [36]. This is exemplified by media outlets that tend to ignore peaceful protest activity and instead focus on dramatic or violent events that make for good television but nearly always result in critical coverage [81]. As a result, the data underpinning LMs stands to misrepresent social movements and disproportionately align with existing regimes of power.", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "The \"hard-wired view\"\nJoseph Levine (who formulated the notion of the explanatory gap) states: \"The explanatory gap argument doesn't demonstrate a gap in nature, but a gap in our understanding of nature.\" [91] He nevertheless contends that full scientific understanding will not close the gap, [43] and that analogous gaps do not exist for other identities in nature, such as that between water and H 2 O. [92] The philosophers Ned Block and Robert Stalnaker agree that facts about what a conscious experience is like to the one experiencing it cannot be deduced from knowing all the facts about the underlying physiology, but by contrast argue that such gaps of knowledge are also present in many other cases in nature, such as the distinction between water and H 2 O. [93][12]\nTo explain why these two ways of knowing (i.e. third-person scientific observation and first-person introspection) yield such different understandings of consciousness, weak reductionists often invoke the phenomenal concepts strategy , which argues the difference stems from our inaccurate phenomenal concepts (i.e., how we think about consciousness), not from the nature of consciousness itself. [94][95] By this view, the hard problem of consciousness stems from a dualism of concepts, not from a dualism of properties or substances. [43]", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" - }, - { - "text": "(o) Collaborative Arrangement\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the Wikibase software to support the Wikidata project, which acts as central storage for the structured data of its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. Both the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation also grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the Wikibase software. Since the project is part of the Foundation's mission to make knowledge accessible\n10\n(Continued)", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "I.2. Subject matter\nThe subject matter of the FWC is scientific support to ECHA for work on restrictions, dose-response functions, Annex XIV, POPs and dossier evaluation.", - "page_start": 4, - "page_end": 4, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed3.pdf" - }, - { - "text": "Type-B Materialism\nType-B Materialism, also known as Weak Reductionism or A Posteriori Physicalism , is the view that the hard problem stems from human psychology, and is therefore not indicative of a genuine ontological gap between consciousness and the physical world. [43] Like Type-A Materialists, Type-B Materialists are\ncommitted to physicalism. Unlike Type-A Materialists, however, Type-B Materialists do accept inconceivability arguments often cited in support of the hard problem, but with a key caveat: that inconceivability arguments give us insight only into how the human mind tends to conceptualize the relationship between mind and matter, but not into what the true nature of this relationship actually is. [43][52] According to this view, there is a gap between two ways of knowing (introspection and neuroscience) that will not be resolved by understanding all the underlying neurobiology, but still believe that consciousness and neurobiology are one and the same in reality. [43]\nWhile Type-B Materialists all agree that intuitions about the hard problem are psychological rather than ontological in origin, they differ as to whether our intuitions about the hard problem are innate or culturally conditioned. This has been dubbed the \"hard-wired/soft-wired distinction.\" [88][89] In relation to Type-B Materialism, those who believe that our intuitions about the hard problem are innate (and therefore common to all humans) subscribe to the \"hard-wired view\". [89] Those that believe our intuitions are culturally conditioned subscribe to the \"soft-wired view\". Unless otherwise specified, the term Type-B Materialism refers to the hard-wired view. [89]\nNotable philosophers who subscribe to Type-B Materialism include David Papineau, [90] Joseph Levine, [91] and Janet Levine. [55]", - "page_start": 9, - "page_end": 10, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Type-C Materialism\nType-C materialists acknowledge a distinction between knowledge and experience [98] without asserting a more complete explanation for the experiential phenomenon. One taking this view would admit that there is an explanatory gap for which no answer to date may be satisfactory, but trust that inevitably the gap will be closed. [52] This is described by analogy to progression in other areas of science, such as massenergy equivalence which would have been unfathomable in ancient times, [52] abiogenesis which was once considered paradoxical from an evolutionary framework, [99][98] or a suspected future theory of everything combining relativity and quantum mechanics. Similarly, type-C materialism posits that the problem of consciousness is a consequence of our ignorance [71][100] but just as resolvable as any other question in neuroscience.\nBecause the explanatory question of consciousness is evaded, type-C materialism does not presuppose [101] the descriptive question, for instance that there is any self-consciousness, wakefulness, or even sentience [102] in a rock. Principally, the basis for the argument arises from the apparently high correlation of consciousness with living brain tissue, [103] thereby rejecting panpsychism [101] without explicitly formulating physical causation. More specifically this position denies the existence of philosophical zombies [64] for which there is an absence of data and no proposed method of testing. [104][105] Whether via the inconceivability or actual nonexistence of zombies, a contradiction is exposed nullifying the premise of the consciousness problem's \"hardness\".\nType-C materialism is compatible with several cases and could collapse into one of these other metaphysical views [52] depending on scientific discovery and its interpretation. With evidence of emergence, it resolves to strong reductionism under type A. With a different, possibly cultural paradigm for understanding consciousness, it resolves to type-B materialism. [32] If consciousness is explained by the quantum mind, then it resolves to property dualism under type D. [106] With characterization of intrinsic properties in physics extending beyond structure and dynamics, it could resolve to type-F monism. [52]", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Get writing suggestions\nWith Editor , bring out your best writing. Editor helps you bring out your best writing by giving you intelligent writing suggestions. It also calculates an Editor Score based on the number and types of suggestions you have yet to address. Select an underlined word or phrase to accept or ignore a suggestion.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - }, - { - "text": "Type-A Materialism\nType-A materialism (also known as reductive materialism or a priori physicalism ) is a view characterized by a commitment to physicalism and a full rejection of the hard problem. By this view, the hard problem either does not exist or is just another easy problem, because every fact about the mind is a fact about the performance of various functions or behaviours. So, once all the relevant functions and behaviours have been accounted for, there will not be any facts left over in need of explanation. [52] Thinkers who subscribe to type-A materialism include Paul and Patricia Churchland, Daniel Dennett, Keith Frankish, and Thomas Metzinger.\nSome type-A materialists believe in the reality of phenomenal consciousness but believe it is nothing extra in addition to certain functions or behaviours. This view is sometimes referred to as strong reductionism . [43][52] Other type-A materialists may reject the existence of phenomenal consciousness entirely. This view is referred to as eliminative materialism or illusionism. [59][60][61]", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "Concerning electrolyte solutions, what assumption makes the primitive model (PM) regarding ions?", - "target_page": 1, - "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nAn alternative procedure consists in carrying out molecular simulations, where both the solvent and solute are treated explicitly. After a rigorous averaging over the solvent configurations, a coarse-grained description of the ions, which still includes the effect of the solvent structure, can be obtained [8-11]. However, this set of methods is purely numeric; they do not provide any analytical expression for thermodynamic quantities. They are therefore restricted to simple geometries [12, 13] (bulk solutions or planar interfaces). The description of complex systems, such as porous or electrochemical materials, is still based on continuous solvent models [14].\nIn this letter we present a method aimed at bridging the gap between analytical and numerical approaches. It is based on the application of liquid perturbation theory (LPT) [15] to effective ion-ion potentials extracted from\n∗ Electronic address: john.molina@etu.upmc.fr\n† Electronic address: jean-francois.dufreche@upmc.fr\nmolecular dynamics (MD) results. Different approximations of the PM are employed for the case of NaCl electrolyte solutions: a two component model (MSA2), that only takes free ions into account, and two different three component models (MSA3 and BIMSA3), which include a third species (the contact ion pair). As we proceed to show, LPT allows us to select the best simple model which accurately accounts for the thermodynamics and the physical-chemistry of the system.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nJohn Jairo Molina 1 , 2 , 3 , ∗ Jean-Fran¸cois Dufrˆeche 1 , 2 , 3 , † Mathieu Salanne 1 , 2 , Olivier Bernard 1 , 2 , Marie Jardat 1 , 2 , and Pierre Turq 1 , 2 1 UPMC-Universit'e Paris 06, UMR 7195, PECSA, F-75005 Paris, France 2 CNRS, UMR 7195, PECSA, F-75005 Paris, France 3 Institut de Chimie S'eparative de Marcoule (ICSM), UMR 5257 CEA-CNRS-Universit'e Montpellier 2, Site de Marcoule,\nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C'eze Cedex, France\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom descriptions; providing analytical expressions of the thermodynamic and structural properties of the ions consistent with the underlying explicit solvent representation. Effective potentials between ions in solution are calculated to perform perturbation theory calculations, in order to derive the best possible description in terms of charged hard spheres. Applying this method to NaCl solutions yields excellent agreement with the all-atom model, provided ion association is taken into account.\nSince the pioneering works of Debye, Huckel, and Onsager, electrolyte solutions have been commonly described by continuous solvent models, for which the McMillan-Mayer theory [1] provides a rigorous statistical-mechanical foundation. Within that level of description, simple phenomenological models such as the primitive model (PM), for which the ions are assimilated to charged hard spheres [2], can lead to explicit formulas for the thermodynamic and structural properties (e.g., with the help of the mean spherical approximation (MSA) [3] or the binding MSA (BIMSA) [4]). These models are the most practical to use [5], since they allow for a direct link between the experimental measurements and the microscopic parameters of the system. Nevertheless, they ignore the molecular structure of the solvent. Consequently, they cannot properly account for the complex specific effects of the ions, which appear in numerous biological, chemical, and physical interfacial phenomena [6, 7], without further developments.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nof the BIMSA3 appears to be negligible compared to the reference term for concentrations less than 1 mol l -1 . The perturbation can then be omitted to obtain a fully analytical theory, determined by the hard sphere diameters and the pair fraction given by LPT; with the free energy and the RDF given in terms of the BIMSA and MSA solutions, as described above. While the procedure we have followed uses two different approximations for the reference and perturbation terms (MSA vs BIMSA), these are known to be accurate for the systems under consideration and do not appear to be inconsistent with each other.\nTo conclude, we have combined MD simulations with LPT to construct simple models of electrolyte solutions which account for the molecular nature of the solvent. The final result is fully analytical and it yields the thermodynamic and structural properties of the solution, in agreement with the original molecular description. The methodology can in principle be adapted to any molecular description of the system (MD simulations involving interaction potentials accounting for polarization effects or Car-Parrinello MD simulations for example) as long as the ion-ion RDF are known. It can also be generalized to study interfaces. The method appears to be a promising approach toward the description of the specific effects of ions, especially for complex systems whose modeling requires an analytic solution.\nThe authors are particularly grateful to Werner Kunz for fruitful discussions.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe first stage consists in calculating the McMillanMayer effective ion-ion interaction potentials V eff ij ( r ), by inverting the radial distribution functions (RDF) g ij ( r ) obtained by MD. The simulations were carried out on a box of 2000 water molecules and 48 NaCl pairs using the same interaction potentials as in reference [16]. This setup corresponds to a concentration of 0 . 64 moll -1 . NPT ensemble sampling at standard pressure and temperature was enforced, with a time step of 1 fs and a pressure bath coupling constant of 1 ps. An equilibration run of 0.25 ns was followed by a production run of 0.6 ns for five different initial configurations. The averages of the resulting RDF were then used for the potential inversion via the HNC closure [15]. These effective potentials are assumed to be concentration independent and will be used for simulations at all concentrations.\nSubtracting the long-range Coulombic potential V LR ij ( r ) (which depends on the dielectric constant of the solvent) from V eff ij ( r ), we obtain the short-range contribution V SR ij ( r ) to the effective potentials. These are given in Fig. 1 (species 1 and 2 refer to Na + and Cl -free ions, respectively). All the short-range potentials exhibit oscillations corresponding to the solvent layering between the ions, but this effect is particularly important for the cation-anion interaction: a considerable potential barrier ( /greaterorsimilar 2 k B T ) separates the first two attractive wells. To serve as a reference, Monte Carlo (MC) simulations were performed with these effective potentials; a comparison between MD and MC RDF is also provided in Fig. 1. The excellent agreement between both sets of RDF validates the HNC inversion procedure [17], and allows us to com-\nFIG. 1: Effective McMillan-Mayer short-range pair potentials extracted from explicit solvent simulations using the HNC closure. (a) Cation anion, (b) cation cation, (c) anion anion, (d) cation anion RDF obtained from explicit solvent MD and implicit solvent MC simulations.\npute all ion thermodynamic properties through implicit solvent MC simulations.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nFIG. 2: (Color online) (a) Osmotic coefficient Φ in the McMillan-Mayer frame of reference. (diamond) MC simulations, (dot dashed) MSA2, (dot) Debye Huckel Limiting law (DHLL), (cross) experiments (Ref. [18] with the McMillanMayer to Lewis Randall conversion). (b) Minimization diameters. (dot dashed) MSA2 and (diamond) MSA-fit.\nWe first used LPT for a two-component system (Na + and Cl -free ions) within the MSA (model MSA2), for concentrations ranging from 0.1 to 2 . 0 mol l -1 . The minimization leads to almost constant diameters on the whole range of concentration: σ 1 = 3 . 67 ˚ A and σ 2 = 4 . 78 ˚ A. As shown in Fig. 2, these parameters yield osmotic coefficients close to MC calculations only at very low concentration, i.e., c ≤ 0 . 1 moll -1 (experimental values are given for indicative purposes only, since a perfect model will exactly match the MC results). For molar solutions, the LPT results differ considerably from MC calculations. This discrepancy can easily be understood by comparing the diameters found within the MSA2 calculation with the effective potentials given in Fig. 1. The anion/cation contact distance obtained within the MSA2 calculation is 4 . 2 ˚ A, which is in the region of the second minimum of the effective potential and corresponds to the situation where there is a single layer of water molecules between the ions. The first minimum of the potential, which corresponds to the contact ion pair (CIP) is thus completely ignored by the MSA2 calculation. If the MSA diameters are directly fitted to reproduce the MC osmotic pressure, much smaller values are obtained. These MSA-fit hydrated diameters, which are compared to the MSA2 diameters in the bottom part of Fig. 2, are averages of the CIP and the solvent-separated ion pair.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nTo overcome this difficulty, we have explicitly introduced the CIP in our model (species 3). Straightforward calculations, based on a characteristic-function formalism, allow us to define an equivalent model in which the free ions and the CIP are explicitly taken into account [19, 20]. We apply this formalism by defining a pair as an anion and a cation at a distance less than 4 ˚ A, which corresponds to the position of the effective potential maximum. The interaction between free, like charges in this new system remains unchanged, and the cation-anion interactions are easily approximated by ex-\n2\nFIG. 3: Effective pair potentials derived for MSA3 and BIMSA3. (a) Cation anion (dashed line: without taking the pair into account), (b) pair cation, (c) pair anion, and (d) pair pair. The internal potential of the pair β ˜ V int ( r ) is set equal to βV eff ij ( r ) for distances less than 4 ˚ A.\nrapolating the original potential at the barrier separating pairs from free ions (as shown in Fig. 3). We assume that the interaction potential is averaged over the rotational degrees of freedom of the CIP and thus pairwise additive. Hereafter, the quantities referring to such a three-component model are written with a tilda symbol. The short-range potentials involving the pair can be derived, in the infinite dilution limit, from an average of the contributing ion interactions. In Fourier space,\n˜ V SR 3 i ( k ) = w ( k / 2) [ V SR 1 i + V SR 2 i ] ( k ) , i = 1 , 2 (2a)\nwhere ˜ w ( r ) is the pair probability distribution\n˜ ˜ V SR 33 ( k ) = ˜ w ( k / 2) 2 [ V SR 11 + V SR 22 +2 V SR 12 ] ( k ) (2b)\n˜ w ( r ) = K -1 0 e -β ˜ V int ( r ) (2c)\n˜ V int ( r ) is the internal part of the pair potential (see Fig. 3), and K 0 is the association constant, defined as:", - "page_start": 1, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe second stage of our coarse-graining procedure consists in applying LPT, in order to deduce the best analytical model of electrolyte solutions which reproduces this molecular description. The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the difference between them treated as a perturbation in the reference potential. Assuming pairwise additive potentials, V ij = V (0) ij + ∆V ij , a first-order truncated expression for the free energy density of the system βf v is obtained,\nβf v /lessorsimilar βf (0) v + 1 2 β ∑ i,j ρ i ρ j ∫ d r g (0) ij ( r ) ∆V ij ( r ) (1)\nwhich depends only on the free-energy density f (0) v and RDF g (0) of the reference fluid, with β = ( k B T ) -1 and ρ i the concentration of species i . The Gibbs-Bogoliubov inequality [15] ensures that the right-hand side of Eq. (1) is actually a strict upper bound. Once a reference system has been chosen, the expression on the right-hand side of Eq. (1) must be minimized with respect to the parameters defining the reference. This procedure yields the best first-order approximation to the free energy of the system under consideration.\nFor a system of charged particles in solution, the natural reference is the PM, defined in terms of the charge and diameter ( σ i ) of each species. In this case, the perturbing potentials are just the short-range effective potentials computed above (∆ V ij = V SR ij ). We use the MSA [3] solution to the PM, since it provides analytical expressions for both the free energy and the RDF. The perturbation term is evaluated using an exponential approximation to the RDF obtained within the MSA, g ( r ) = exp [ g MSA ( r ) -1], which removes any unphysical negative regions and improves the comparison with HNC calculations.\nΦ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "5. Discussion\nSince they implement full approximate Bayesian inferences, AIF models are computationally more demanding than many approaches traditionally used in cognitive and agent-based modelling, in particular when the dimensionality of the generative model is large. This means that models with highly multidimensional or complex behaviour and large numbers of agents can be computationally infeasible to implement, especially given the additional computational demands introduced by fitting these models to empirical data. Avenues for addressing this implicit scaling problem were proposed in the context of machine learning applications [68,69], and with the use of simplifying assumptions-the use of which are ubiquitous in computational modelling-AIF has been used to model multi-agent phenomena, such as opinion dynamics [15,70], coordinated foraging [71] and fish school movements [12]. It remains to be explored how AIF models can be applied to highly complex natural phenomena, such as a concrete election, which underscores the need for efficient but flexible and accessible software tools in the field.\nThere are many ways in which ActiveInference can be improved. It would be useful to extend the set of dynamic belief states to include prediction errors since they are often used for model-based neuroscience. This would entail departing from discrete state-space (i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering or predictive coding (see below). An alternative would be to generate prediction errors from belief updating under discrete models, where prediction errors can be read as the (KL) divergence between posterior and prior beliefs (i.e., complexity or information gain). A simple interface could be added for creating custom parametrisations of the requisite parameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed to Dirichlet distributions. Parameter learning could be extended to all generative model parameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or temperature of the parameters that are learned); similarly for the precision over expected free energies γ . Preference priors should also be implementable for environmental states, in addition to observations, and A can be made action dependent.", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "III. MODELLING APPROACHES\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanoparticles are not taken into account. However, under certain conditions one can augment equation (1) for the evolution of the film thickness by coupling it to an equation for the evolution of the mean particle concentration. The resulting model is able to describe the behaviour of an evaporating solution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. Weshould expect such a model to describe the mesoscopic dewetting front discussed above. However, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\nfilm.\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a discrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on evaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The validity of this strong assumption regarding the relevant transport processes can be confirmed from an estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The convective mobility is proportional to h 3 , i.e., it is large for thick films but decreases strongly with reduced film thickness. The evaporative mobility, however, is a constant, implying that evaporation will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] and a small contact angle ( ≈ 0 . 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film and may explain why one has such good agreement between the experimentally observed patterns and the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model [35]. We introduce the KMC model below in Section III A.", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "What role will strategic alliances play in extending\nAlliances are an important part of our strategic direction. Recently, we announced several partnerships that help us expand sales channels and distribution of our products and services. Our partners were looking for wireless transaction solutions to complement their own offerings, and they selected Euronet's products, proving that our solutions are rock solid.\nGemplus, the world's number one provider of smart card-based solutions, chose us as their global partner to provide electronic recharge solutions to mobile operators. We also have agreements with Sila Communications to help us market our suite of mobile banking solutions throughout Europe, the Middle East and Asia Pacific and with Aether Systems which is offering our mobile banking solutions in the United States.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "What is the principle of the liquid perturbation theory (LPT) ?", - "target_page": 2, - "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "B. Dynamical Density Functional theory\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related to its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. This implies that (i) no liquid can be transported to a site on the surface already filled with liquid, i.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to distinguish between the influence of the short- and the long-range parts of the interactions with the substrate, as all such interactions are absorbed into the effective chemical potential.\nHowever, using dynamical density functional theory (DDFT) [78-83] one can develop a model for the processes in the ultrathin postcursor film without these limitations, although here we limit ourselves to developing the theory at the level of the KMC and solely discuss how to extend it to incorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes the coupled dynamics of the density fields of the liquid ρ l and the nanoparticles ρ n . The densities ρ l and ρ n are defined as the probabilities of finding a given lattice site on the surface to be occupied by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond to number densities as we use the lattice spacing σ = 1 as our unit of length.\nTo develop the DDFT, one must first derive the underlying free energy functional F [ ρ l , ρ n ] , and secondly, devise dynamical equations for both density fields that account for the conserved and the non-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. For a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) approximation for the free energy of the system [78, 84] which contains an entropic contribution and contributions from the interactions between the different species (nanoparticles and liquid). The free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is coupled to a reservoir with chemical potential µ ), whereas the nanoparticles are treated in the\n14\ncanonical ensemble. The free energy functional is first defined on the original KMC lattice. However, after re-writing the interaction terms employing gradient operators [78] one finally obtains the free energy functional for a continuous system", - "page_start": 13, - "page_end": 14, - "source_file": "1001.2669.pdf" - }, - { - "text": "IV. CONCLUSION\nWe have discussed recent work on pattern formation processes in films and drops of evaporating suspensions/solutions of polymers and particles. After reviewing experiments on suspensions of thiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and phase change processes involved. A theoretical approach to the modelling of the hydrodynamics on the mesoscale has been described as well as more microscopic models for the dynamics in the observed nanoscopic 'postcursor' film. In particular, we have introduced (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to investigate and understand the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor' film that remains behind the mesoscopic dewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n23\nscopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion within the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquidparticle and particle-particle interactions into account and therefore allows us to distinguish different regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport regime where the instability is almost completely independent of the interaction strengths and a demixing regime where particles and liquid demix at the receding front thereby increasing its transverse instability.", - "page_start": 22, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "IV. CONCLUSION\nThe dynamical density functional theory describes the coupled dynamics of the density fields of the liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional hamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evaporating ultrathin film and also to investigate the influence of processes such as surface diffusion by the liquid, which are not incorporated in the KMC model. However, it is straightforward to extend the theory to consider a fully three-dimensional fluid film, in which one can distinguish between short- and long-range interactions of solvent and/or solute with the substrate. We have, however, restricted the examples given here to situations that can also be described using the KMC model. A further exploration will be presented elsewhere.\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It results from a long-wave approximation and consists of coupled evolution equations for the film thickness profile and the mean particle concentration. It has been used to discuss the self-pinning of receding contact lines that is related to the formation of rings of dried-in particles (coffeestain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the combined effects of convection and evaporation.\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques that allow one to produce hierarchically structured functional layers for a wide range of applications such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly towards increasingly complex systems. For example, there have been investigations of the influence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal particles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evaporating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of a secondary phase separation on evaporation-induced pattern formation in polymer films [102], and of the influence of an imposed flow on decomposition and deposition processes in a sliding ridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "B. Dynamical Density Functional theory\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have over-damped stochastic equations of motion [80-83]. Here, we assume that M n ( ρ l ) = α Θ s ( ρ l -0 . 5) , where Θ s ( x ) is a continuous function that switches smoothly from the value 0 to the value 1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that the nanoparticles are immobile when the local liquid density is small (dry substrate) and have a mobility coefficient α when ρ l is high (wet substrate).\nFor the evolution of the liquid density distribution we assume that the liquid is able to evaporate from the surface into the vapour (reservoir) above the surface (non-conserved dynamics) and may\n15\nFIG. 4: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles with average density ρ av n = 0 . 3 . The top row are the nanoparticle density profiles and the bottom row are the corresponding liquid density profiles at the times t/t l = 8 (left) and 80 (right), where t l = 1 /kTM nc l σ 2 . The parameters are kT/ε ll = 0 . 8 , ε nl /ε ll = 0 . 6 , ε nn = 0 , α = 0 . 4 M nc l σ 4 , M c l = 0 , ρ l ( t = 0) = 0 . 9 ± ξ (where ξ represents white noise of amplitude 0.05) and ( µ -µ coex ) /kT = -0 . 88 , where the liquid exhibits spinodal decomposition-evaporation.\nalso diffuse over the substrate (conserved dynamics). The conserved part is treated along the lines developed above for the nanoparticles. For the non-conserved part we assume a standard form [85], i.e., the change in time of ρ l is proportional to -( µ surf ( r , t ) -µ ) = -δF [ ρ n , ρ l ] /δρ l ( r ) where µ surf ( r , t ) is the local chemical potential of the liquid at the point r on the surface at time t . This gives the evolution equation for the liquid density", - "page_start": 14, - "page_end": 15, - "source_file": "1001.2669.pdf" - }, - { - "text": "C. Thin film hydrodynamics\nwhere φ c = 0 . 64 corresponds to random close packing of spherical particles. For the nanoparticle volume per length h p = φh one obtains the following evolution equation:\n∂ t ( φh ) = ∇· [ φQ c ∇ δF δh ] + ∇· [ D ( φ ) h ∇ φ ] , (9)\nwhere the particle concentration dependent diffusion coefficient D ( φ ) is related to the viscosity by the Einstein relation D ( φ ) = kT/ 6 πRη ( φ ) , where R is the radius of the nanoparticles [96].\nWe illustrate results obtained employing this thin film theory using the single example of a receding dewetting front for a partially wetting film. We use the disjoining pressure and material constants for the liquid considered in Ref. [57], where the evaporative and convective dewetting of a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The expression that we employ for the local free energy term in Eq. (2) is:\nf ( h ) = S LW d 2 0 h 2 + S P exp ( d 0 -h l 0 ) , (10)\nwhere the parameters characterising the interaction between the liquid film and the surface are the apolar and polar spreading coefficients S LW and S P , respectively, the Debye length l 0 and the Born repulsion length d 0 [57]. The resulting disjoining pressure Π = -∂ h f ( h ) allows for a stable precursor film (thickness h precursor ) and also has a second (larger) thickness ( h 0 ) that corresponds to a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of film and drop states for similar disjoining pressures. Our results are calculated for a system where the profiles only vary in one Cartesian direction ( x ), corresponding to a straight dewetting front. However, our results may also be interpreted as applying to a circular flat drop whose front remains\n19\n1\n1", - "page_start": 18, - "page_end": 19, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\n[65] J. P. Burelbach, S. G. Bankoff, and S. H. Davis, 'Nonlinear stability of evaporating/condensing liquid films,' J. Fluid Mech. 195 , 463-494 (1988).\n[66] A. Oron and S. G. Bankoff, 'Dewetting of a heated surface by an evaporating liquid film under conjoining/disjoining pressures,' J. Colloid Interface Sci. 218 , 152-166 (1999).\n[67] L. W. Schwartz, R. V. Roy, R. R. Eley, and S. Petrash, 'Dewetting patterns in a drying liquid film,' J. Colloid Interface Sci. 214 , 363-374 (2001).\n[68] K. Kargupta, R. Konnur, and A. Sharma, 'Spontaneous dewetting and ordered patterns in evaporating thin liquid films on homogeneous and heterogeneous substrates,' Langmuir 17 , 1294-1305 (2001).\n[69] M. Bestehorn and D. Merkt, 'Regular surface patterns on Rayleigh-Taylor unstable evaporating films heated from below,' Phys. Rev. Lett. 97 , 127802 (2006).\n[70] G. F. Teletzke, H. T. Davis, and L. E. Scriven, 'Wetting hydrodynamics,' Rev. Phys. Appl. 23 , 9891007 (1988).\n[71] J. N. Israelachvili, Intermolecular and Surface Forces , Academic Press, London (1992).\n[72] V. S. Mitlin, 'Dewetting of solid surface: Analogy with spinodal decomposition,' J. Colloid Interface Sci. 156 , 491-497 (1993).\n[73] L. M. Pismen and Y. Pomeau, 'Disjoining potential and spreading of thin liquid layers in the diffuse interface model coupled to hydrodynamics,' Phys. Rev. E 62 , 2480-2492 (2000).", - "page_start": 29, - "page_end": 29, - "source_file": "1001.2669.pdf" - }, - { - "text": "III. MODELLING APPROACHES\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydrodynamics. Starting from the Stokes equations, together with continuity and boundary conditions at the substrate and free surface, one applies a long-wave approximation (assuming small surface slopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness profile h ( x, y, t ) . In the case of volatile liquids one finds [55-58, 64]\n∂ t h = ∇· [ Q c ∇ δF δh ] -Q e δF δh , (1)\nwith the mobility functions Q c ( h ) = h 3 / 3 η ≥ 0 (assuming Poiseuille flow in the film and no slip at the substrate; η is the dynamic viscosity) and Q e ≥ 0 for the convective and evaporative part of the dynamics, respectively. Q e is a rate constant that can be obtained from gas kinetic theory or from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the film is close to the saturation pressure. For alternative expressions that are used to describe the non-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65-69]. Finally, ∇ = ( ∂ x , ∂ y ) , and ∂ t , ∂ x and ∂ y denote partial derivatives w.r.t. time and the coordinates.\nFocusing on the influence of capillarity and wettability only, the energy functional F [ h ] is given by\nF [ h ] = ∫ dx ∫ dy [ γ 2 ( ∇ h ) 2 + f ( h ) -µh ] (2)\n7\nwhere γ is the liquid-gas surface tension and f ( h ) is a local free energy term that describes the wettability of the surface. Since µ corresponds to a chemical potential, the term µh may either bias the system towards the liquid or towards the gas state. The variation of F w.r.t. h gives the pressure. It contains the curvature (Laplace) pressure -γ ∆ h and the disjoining pressure Π( h ) = -∂ h f ( h ) . Many different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70-73]).", - "page_start": 6, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "III. MODELLING APPROACHES\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanoparticles are not taken into account. However, under certain conditions one can augment equation (1) for the evolution of the film thickness by coupling it to an equation for the evolution of the mean particle concentration. The resulting model is able to describe the behaviour of an evaporating solution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. Weshould expect such a model to describe the mesoscopic dewetting front discussed above. However, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\nfilm.\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a discrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on evaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The validity of this strong assumption regarding the relevant transport processes can be confirmed from an estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The convective mobility is proportional to h 3 , i.e., it is large for thick films but decreases strongly with reduced film thickness. The evaporative mobility, however, is a constant, implying that evaporation will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] and a small contact angle ( ≈ 0 . 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film and may explain why one has such good agreement between the experimentally observed patterns and the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model [35]. We introduce the KMC model below in Section III A.", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "I. INTRODUCTION\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such evaporatively receding contact lines may deposit very regular line or ring patterns parallel to the moving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating drop of colloidal suspension is well known as the 'coffee stain effect' [44]. Detailed investigations reveal the emergence of rich structures including multiple irregular rings, networks, regular droplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crystalline structures [22, 30, 45-49]. The deposition of regularly spaced straight lines orthogonal to the moving contact line has also been reported [50]. Droplet patterns may as well be created employing solvent-induced dewetting of glassy polymer layers below the glass transition temperature [51-53].\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and theoretically [55-58]. In this case, different contact line instabilities have been observed for evaporating liquid drops [59, 60].\nIn the present article we review and preview the experiments and in particular the various modelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting solvents. After reviewing the basic experimental results in Section II, we discuss in Section III several theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A, a dynamic density functional theory in Section III B, and a thin film evolution equation in Section III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the individual approaches and future challenges to all of them.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions (nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled transport and phase changes. These approaches range from microscopic discrete stochastic theories to mesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor film' that remains behind a mesoscopic dewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative dewetting front which results in highly branched fingering structures. The subtle interplay of decomposition in the film and contact line motion is discussed.\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ coupled evolution equations for the film thickness profile and mean particle concentration. The model is used to discuss the self-pinning and de-pinning of a contact line related to the 'coffee-stain' effect.\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as possible future developments and extensions.\nThe paper is published in: J. Phys.-Cond. Mat. 21 , 264016 (2009), in the Volume 'Nanofluids on solid substrates' and can be obtained at http://dx.doi.org/10.1088/0953-8984/21/26/264016\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "By how much did the Hartford group's link to AARP website account concerning buisness made over the internet ?", - "target_page": 16, - "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Dear Fellow Shareholders,\n'P artnering' is a popular business buzzword that may vanish as quickly as it appeared. The Hartford's partnerships, on the other hand, are built for the long term and have played a major role in the company's growth and success.\nThe company enjoys outstanding partnerships with several of the world's top asset managers. It also values its thousands of relationships with financial intermediaries such as large broker-dealers, banks and independent financial planners-and with affinity partners who extend The Hartford's reach into large, growing markets.\n'A lot of people talk about having the right partners, but The Hartford views it differently from most,' says Gary Trippe, CEO of Fort Myers, Fla., propertycasualty agency Oswald, Trippe and Company, Inc. 'They look for partners who share their core values, and the relationship is based on trust and respect. It's all about compatibility.' Trippe should know. His\nagency writes three times as much business with The Hartford, in both personal and commercial lines, as it writes with any other insurer.\nMutually beneficial partnerships with successful businesses of all sizes are the foundation of The Hartford's business model.\nPerhaps no relationship represents shared values and shared success better than the one with AARP, which signed a new eight-year contract with The Hartford that began Jan. 1, 2002. The AARP insurance program with The Hartford is a model of affinity marketing and distribution savvy. AARP's membershipthose age 50 and over-is the fastest-growing segment of the U.S. population. Computer use among this group is growing by an estimated 20 percent per year, and the population segment respects established brands and seeks value, convenience and extraordinary service.\nThat right combination of factors helps make AARP's World Wide Web site one of The Hartford's\n13\nmost dynamic sources of business growth. In 2001 the company's link to AARP's Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet.", - "page_start": 14, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nBecause The Hartford quotes and issues this business online (and added online billing in 2001), acquisition and processing costs are 15 to 20 percent lower than those of traditional direct-marketing or face-toface sales. Because of this and other factors, the expense ratio for AARP business is 30 percent below that of the industry in general. And the customer renewal rate is 96 percent, versus the industry's 88 percent, making the AARP program yield some of the most profitable auto business The Hartford writes.\nThe relationship also has The Hartford thinking ahead toward new business and an even stronger relationship with AARP members. The Hartford can crossmarket auto insurance to homeowner's customers and homeowner's insurance to auto customers, which presents a tremendous growth opportunity. In addition,\nThe Hartford is committed to providing value to AARP members in many ways. An example: The Hartford and AARP work with the MIT Age Lab to produce information-available in print and on both partners' Web sites-advising AARP members about Alzheimer's disease and other forms of dementia as they affect driving ability. The information guides caregivers struggling with difficult decisions about family members' safety behind the wheel. The resource-a customer solution like no other-helps enhance the superior value The Hartford provides to AARP members.\nAlthough it's the most comprehensive, the AARP relationship isn't The Hartford's only affinity program. The company also has affinity arrangements with USAA and other companies. Regardless of the program's size, the affinity partners share the right qualities: strong name-brand recognition, first-class marketing and a broad and loyal customer base.\nIn other words, they share some of The Hartford's core attributes.\n14\n/H17076 T he Campbell Agency in Byron Center, Mich., found that by aligning its organization to mirror that of The Hartford, the two partners could work more closely-and grow more-together. For example, The Campbell Agency emulated The Hartford by dedicating a team to the small-business market.\nThat made the agency more proficient at identifying potential customers and setting sales targets, according to Mary Lou Barna, vice president, sales and marketing. In other words, she says, the partnership with The Hartford has made Barna and her colleagues better managers.", - "page_start": 15, - "page_end": 16, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "the\n/H17075 K wadwo Dankyi-Ampadu, service representative, personal lines, takes customer phone calls in The Hartford's Southington, Conn., customer call center. It's one of three AARP call centers throughout the United States.\nN ew technology tools made The Hartford Experiencecustomer solutions, ease of doing business and extraordinary service-more real than ever for our customers in 2001.\nIt was a year that saw the debut of life operations' Hartford Investor Web portal, expanded Web portals for group benefits administrators, and enhancements to technology for The Hartford's property-casualty agents and customers.\nHartford Investor is both a versatile personal assistant and an aid in wholesaling, especially for the independent financial planner channel. Broker-dealers and financial advisors can use it to research The Hartford's full complement of individual life and investment products, update their books of business in seconds, track daily fund performance, run financialplanning models, receive online product training, produce customized presentations and even submit business electronically.\nIn short, the portal allows The Hartford to bring products and functions from a variety of sources into one convenient online environment.\nHartford Investor has two strategic objectives: One, deepen current intermediaries' loyalty to The Hartford by extending The Hartford Experience right to their desktops. Two, expand the network of intermediaries by giving them the technological support they need to grow their businesses.\nMore than 153,000 licensed intermediaries-from solo advisors to members of large financial institutions-are appointed to sell The Hartford's products. Yet fewer than 60,000 actively write business for the company. The untapped potential is vast, especially among independents, the fastest-growing distribution channel and the only one in which The Hartford doesn't hold the largest market share.\nThat's bound to change. With Hartford Investor available on their desktops, intermediaries will have far\n21", - "page_start": 21, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Transfer Agent/Shareholder Records\nFor information or assistance regarding stock records, dividend checks or stock certificates, please contact The Hartford's transfer agent:\nThe Bank of New York Shareholder Relations Department-11E P.O. Box 11258 Church Street Station New York, NY 10286 800-254-2823\nTo send certificates for transfer and address changes:\nThe Bank of New York Receive and Deliver Department-11W P.O. Box 11002 Church Street Station New York, NY 10286\nAddress inquiries about The Hartford's Dividend Reinvestment and Cash Payment Plan to:\nThe Bank of New York Dividend Reinvestment Department P.O. Box 1958 Newark, NJ 07101-9774\nE-mail: shareowner-svcs@bankofny.com\nInternet address: www.stockbny.com\n36\nInvestor Relations\nThe Hartford Financial Services Group, Inc. Hartford Plaza, HO-1-01 Hartford, Connecticut 06115 Attn: Investor Relations\n860-547-2537\nMedia Inquiries\nThe Hartford Financial Services Group, Inc. Media Relations Hartford Plaza, T-12-56 Hartford, CT 06115 860-547-5200", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nFuture generations will measure the full impact of Sept. 11. But at The Hartford, one thing is known already. As they did after disasters such as the New York fire of 1835, the Chicago fire of 1871 and the 1906 San Francisco earthquake, The Hartford's people in 2001 ran their business the only way they know howthe right way. They put customers first and kept promises. In so doing, they helped lay the foundation for a more confident future.\n/H17076 N ew York employees admire a painting depicting the courage and resilience of The Hartford employees and the New York rescue teams. The montage, which now hangs in the lobby of The Hartford's New York offices, was painted by Andy Yelenak of The Hartford's Information Technology department.\n/H17073 T he Hartford's New York staff got their businesses back up and running in less than a week after the Sept. 11 attack, despite the destruction of their offices. Among those who were instrumental in getting 330 employees situated in temporary office space were, left to right, Lucille T. Sgaglione, vice president, Hartford Financial Products; Linda Banks, administrative assistant, office support\nservices, Business Insurance; Holly McCalmont, human resources manager, Business Insurance; Jim Norris, business technology solutions manager, Business Insurance; Craig Lowenthal, first vice president and chief information officer, Hartford Financial Products; and Susan Miranda, support services manager, Hartford Specialty Co.\n11\n/H17074 J ohn Belisle, right, is senior vice president of Oswald, Trippe and Company, Inc. in Fort Myers, Fla., one of The Hartford's largest sellers of Select Customer commercial insurance. David van der Merwe, president of electronics manufacturer Saftronics, Inc., depends on him for reliable counsel, as well as products tailored to Saftronics' business.\n/H17075 T he Hartford signed a new eightyear contract, beginning Jan.1, 2002, to continue its highly successful relationship with AARP. Property & Casualty Operations President and CEO Dave Zwiener, second from left, works closely with, left to right, Bill Farris, director, financial products, AARP Services, Inc.; Leisha Spaulding, manager, financial products, AARP Services, Inc.; and Steve Zaleznick, CEO, AARP Services, Inc.", - "page_start": 12, - "page_end": 13, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "products & services\nIn managing its product portfolio, The Hartford follows its own advice: think ahead and diversify. The company's earnings base derives from a variety of businesses. Diversification is a key element in managing risk and ensuring profitability-a time-tested philosophy that held especially true in 2001, as the company's other businesses evolved to anticipate changing market demands and to offer protection from new risks.\nThe property-casualty Business Insurance group, for example, extended its coverage to include common risks associated with e-commerce. Hartford Financial Products' (HFP) coverage continued to meet emerging risks in an extremely volatile business environment.\n18\nThe Hartford helped customers manage risk by developing a new category of commercial coverage called CyberFlex. TM This targets the previously unmet needs of small and mid-sized businesses that are integrating the Internet and other communications tools into their regular operations.\nA 2001 survey by The Hartford revealed that 80 percent of small and mid-sized businesses weren't sure if their current insurance policies covered specific-and increasingly common-risks such as e-mail viruses, Web site business interruption and online copyright infringement. CyberFlex coverage protects middle-market and small-business policyholders against the risk of those potentially debilitating conditions.\nCyberFlex is part of a broad array of industryspecific coverages in The Hartford's SPECTRUM ® business-owner's policy, including protection against employment practices liability, equipment breakdown and business interruption. As the economic environment changes rapidly, The Hartford thinks ahead by providing those flexible coverages. And the company's\nstreamlined product-development process maximizes speed-to-market so agents have the right products to sell at the right time. That's one reason why we estimate The Hartford's small-business insurance growth is five to six times the industry average.\nDeveloping products for a changing business environment is also a proven skill of HFP. The unit completed its first full year as part of The Hartford after our 2000 acquisition of Reliance Group Holdings, Inc.'s financial products and excess and surplus lines.\nIt was quite a year after quite a decade. Demand for HFP's mainstay directors and officers liability", - "page_start": 19, - "page_end": 20, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Corporate Information\nCorporate Headquarters\nThe Hartford Financial Services Group, Inc. 690 Asylum Avenue Hartford, Connecticut 06115 860-547-5000\nInternet Address\nhttp://www.thehartford.com\nAnnual Meeting\nShareholders are cordially invited to attend The Hartford's Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens Theater at The Hartford Financial Services Group, Inc.'s home office at 690 Asylum Avenue, Hartford, Connecticut. Shareholders of record as of February 28, 2002 are entitled to notice of, and to vote at, the Annual Meeting.", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "the\n/H17073 T he Hartford's acquisition of Fortis Financial Group in 2001 enhanced the company's market share and distribution advantage. Most importantly, the acquisition brought into The Hartford's family powerful sales professionals like Allen Chinoy of Darien, Ill., left, the nation's fifthleading producer of The Hartford's variable universal life insurance. Chinoy is a vocal supporter of Hartford Investor, which makes it easier for him to show customers such as Dr. Dilip Patel how his portfolio is performing.\n/H17075 J oe Smith, right, and Kim Connolly, left, are a brother-sister team heading Smith Brothers Insurance, Inc. of Glastonbury, Conn. These VIP agents are enthusiastic users of The Hartford's Electronic Business Center (EBC) and other technological tools for propertycasualty agents. They piloted the EBC and have given valuable feedback to Senior Commercial Underwriter Tracey Kamenash and others at The Hartford to help develop the EBC standards and navigational model.\n22\nmore incentive to look to The Hartford for the right products to offer their clients.\nThe Hartford's Group Benefits Division's (GBD) Producer View Web portal enables group benefits brokers to manage their books of business and track commissions and premium payments online. It's also a resource for product brochures and other marketing material. GBD's Employer View portal meets benefits managers' increasing demands for self-service. In 2001 GBD added online billing capability to the portal, which also features access to forms and status reports on premium payments and claims, among other functions.\nThe property-casualty operation's Electronic Business Center (EBC) has transformed the way agents do business. They can obtain quotes almost instantly, check billing and loss information, track claims payments and perform a host of other daily tasks. Because it's their virtual back office, agents have more time to do what's right for them: build their business. The EBC is proving especially valuable in the high-growth smallbusiness market, where service is as important as price.\nThe EBC saves hours of administrative time, allowing agents to sell commercial insurance products much more profitably.", - "page_start": 23, - "page_end": 24, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "The Hartford Financial Services Group, Inc.\n2001 Summary Annual Report\nThere's only", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Insurance Financial Strength Ratings\nHartford Fire, A.M. Best = A+. Hartford Fire, Fitch = AA. Hartford Fire, Standard & Poor's = AA. Hartford Fire, Moody's = Aa3. Hartford Life Insurance Company, A.M. Best = A+. Hartford Life Insurance Company, Fitch = AA+. Hartford Life Insurance Company, Standard & Poor's = AA. Hartford Life Insurance Company, Moody's = Aa3. Hartford Life & Accident, A.M. Best = A+. Hartford Life & Accident, Fitch = AA+. Hartford Life & Accident, Standard & Poor's = AA. Hartford Life & Accident, Moody's = Aa3. Hartford Life & Annuity, A.M. Best = A+. Hartford Life & Annuity, Fitch = AA+. Hartford Life & Annuity, Standard & Poor's = AA. Hartford Life & Annuity, Moody's = Aa3\nFor additional information, see the Company's Annual Report on Form 10-K.\n34", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "How many licensed intermediaries did Hartford group have in 2001 ?", - "target_page": 23, - "target_passage": "More than 153,000 licensed intermediaries", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "the\n/H17075 K wadwo Dankyi-Ampadu, service representative, personal lines, takes customer phone calls in The Hartford's Southington, Conn., customer call center. It's one of three AARP call centers throughout the United States.\nN ew technology tools made The Hartford Experiencecustomer solutions, ease of doing business and extraordinary service-more real than ever for our customers in 2001.\nIt was a year that saw the debut of life operations' Hartford Investor Web portal, expanded Web portals for group benefits administrators, and enhancements to technology for The Hartford's property-casualty agents and customers.\nHartford Investor is both a versatile personal assistant and an aid in wholesaling, especially for the independent financial planner channel. Broker-dealers and financial advisors can use it to research The Hartford's full complement of individual life and investment products, update their books of business in seconds, track daily fund performance, run financialplanning models, receive online product training, produce customized presentations and even submit business electronically.\nIn short, the portal allows The Hartford to bring products and functions from a variety of sources into one convenient online environment.\nHartford Investor has two strategic objectives: One, deepen current intermediaries' loyalty to The Hartford by extending The Hartford Experience right to their desktops. Two, expand the network of intermediaries by giving them the technological support they need to grow their businesses.\nMore than 153,000 licensed intermediaries-from solo advisors to members of large financial institutions-are appointed to sell The Hartford's products. Yet fewer than 60,000 actively write business for the company. The untapped potential is vast, especially among independents, the fastest-growing distribution channel and the only one in which The Hartford doesn't hold the largest market share.\nThat's bound to change. With Hartford Investor available on their desktops, intermediaries will have far\n21", - "page_start": 21, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "The Hartford Financial Services Group, Inc.\n2001 Summary Annual Report\nThere's only", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "products & services\nH ow do you secure the future when the present is puzzling enough? It's a big challenge, and The Hartford's primary objective. Everything we do is designed to help our customers deal with the uncertainties that lie ahead.\nThe Hartford believes the best way to secure the future is to provide customers with the right products, and then back those products with outstanding performance and great service. Staying focused on this objective was never more important-or more challenging-than in 2001.\nTrue to form, The Hartford's life operations' annuities and mutual funds delivered high-quality performance in a time of market turmoil. Despite an anemic stock market, 87 percent of the funds in The Hartford's Director variable annuity remained in the first or second quartile of three-year returns within the Lipper Peer Group in 2001. Sixty-four percent of the funds in the Leaders suite of annuities and 91 percent of The Hartford's mutual funds remained in the first or second quartile over the three-year period.\nThe ability to deliver that kind of performance can be traced to our money managers-Wellington Management Co., American Funds, Franklin Templeton Investments, MFS Investment Management, AIM Funds Management, Inc., Putnam Investment Management and The Hartford's own Hartford Investment Management Co.\nAll of The Hartford's money managers have years of experience and are among the most respected firms in the industry. Their experience and expertise were especially important during the market volatility we saw in 2001. They always stay focused on long-term performance, which is the true measuring stick of The Hartford's value to its customers.\nBesides outstanding products and excellent management, great service is a critical component in delivering the right solutions to our customers. In 2001, The Hartford won an unprecedented sixth consecutive DALBAR Annuity Service Award, as well as the\n17\nIntermediary Service Award and the first-ever Life Insurance Service Award. The triple win reflected the overall excellence of The Hartford's service, a natural complement to the company's quality products. DALBAR also recognized The Hartford's mutual funds as the industry leader in several categories, including investment management.", - "page_start": 18, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Corporate Information\nCorporate Headquarters\nThe Hartford Financial Services Group, Inc. 690 Asylum Avenue Hartford, Connecticut 06115 860-547-5000\nInternet Address\nhttp://www.thehartford.com\nAnnual Meeting\nShareholders are cordially invited to attend The Hartford's Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens Theater at The Hartford Financial Services Group, Inc.'s home office at 690 Asylum Avenue, Hartford, Connecticut. Shareholders of record as of February 28, 2002 are entitled to notice of, and to vote at, the Annual Meeting.", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Insurance Financial Strength Ratings\nHartford Fire, A.M. Best = A+. Hartford Fire, Fitch = AA. Hartford Fire, Standard & Poor's = AA. Hartford Fire, Moody's = Aa3. Hartford Life Insurance Company, A.M. Best = A+. Hartford Life Insurance Company, Fitch = AA+. Hartford Life Insurance Company, Standard & Poor's = AA. Hartford Life Insurance Company, Moody's = Aa3. Hartford Life & Accident, A.M. Best = A+. Hartford Life & Accident, Fitch = AA+. Hartford Life & Accident, Standard & Poor's = AA. Hartford Life & Accident, Moody's = Aa3. Hartford Life & Annuity, A.M. Best = A+. Hartford Life & Annuity, Fitch = AA+. Hartford Life & Annuity, Standard & Poor's = AA. Hartford Life & Annuity, Moody's = Aa3\nFor additional information, see the Company's Annual Report on Form 10-K.\n34", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Transfer Agent/Shareholder Records\nFor information or assistance regarding stock records, dividend checks or stock certificates, please contact The Hartford's transfer agent:\nThe Bank of New York Shareholder Relations Department-11E P.O. Box 11258 Church Street Station New York, NY 10286 800-254-2823\nTo send certificates for transfer and address changes:\nThe Bank of New York Receive and Deliver Department-11W P.O. Box 11002 Church Street Station New York, NY 10286\nAddress inquiries about The Hartford's Dividend Reinvestment and Cash Payment Plan to:\nThe Bank of New York Dividend Reinvestment Department P.O. Box 1958 Newark, NJ 07101-9774\nE-mail: shareowner-svcs@bankofny.com\nInternet address: www.stockbny.com\n36\nInvestor Relations\nThe Hartford Financial Services Group, Inc. Hartford Plaza, HO-1-01 Hartford, Connecticut 06115 Attn: Investor Relations\n860-547-2537\nMedia Inquiries\nThe Hartford Financial Services Group, Inc. Media Relations Hartford Plaza, T-12-56 Hartford, CT 06115 860-547-5200", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\n'P artnering' is a popular business buzzword that may vanish as quickly as it appeared. The Hartford's partnerships, on the other hand, are built for the long term and have played a major role in the company's growth and success.\nThe company enjoys outstanding partnerships with several of the world's top asset managers. It also values its thousands of relationships with financial intermediaries such as large broker-dealers, banks and independent financial planners-and with affinity partners who extend The Hartford's reach into large, growing markets.\n'A lot of people talk about having the right partners, but The Hartford views it differently from most,' says Gary Trippe, CEO of Fort Myers, Fla., propertycasualty agency Oswald, Trippe and Company, Inc. 'They look for partners who share their core values, and the relationship is based on trust and respect. It's all about compatibility.' Trippe should know. His\nagency writes three times as much business with The Hartford, in both personal and commercial lines, as it writes with any other insurer.\nMutually beneficial partnerships with successful businesses of all sizes are the foundation of The Hartford's business model.\nPerhaps no relationship represents shared values and shared success better than the one with AARP, which signed a new eight-year contract with The Hartford that began Jan. 1, 2002. The AARP insurance program with The Hartford is a model of affinity marketing and distribution savvy. AARP's membershipthose age 50 and over-is the fastest-growing segment of the U.S. population. Computer use among this group is growing by an estimated 20 percent per year, and the population segment respects established brands and seeks value, convenience and extraordinary service.\nThat right combination of factors helps make AARP's World Wide Web site one of The Hartford's\n13\nmost dynamic sources of business growth. In 2001 the company's link to AARP's Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet.", - "page_start": 14, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nFuture generations will measure the full impact of Sept. 11. But at The Hartford, one thing is known already. As they did after disasters such as the New York fire of 1835, the Chicago fire of 1871 and the 1906 San Francisco earthquake, The Hartford's people in 2001 ran their business the only way they know howthe right way. They put customers first and kept promises. In so doing, they helped lay the foundation for a more confident future.\n/H17076 N ew York employees admire a painting depicting the courage and resilience of The Hartford employees and the New York rescue teams. The montage, which now hangs in the lobby of The Hartford's New York offices, was painted by Andy Yelenak of The Hartford's Information Technology department.\n/H17073 T he Hartford's New York staff got their businesses back up and running in less than a week after the Sept. 11 attack, despite the destruction of their offices. Among those who were instrumental in getting 330 employees situated in temporary office space were, left to right, Lucille T. Sgaglione, vice president, Hartford Financial Products; Linda Banks, administrative assistant, office support\nservices, Business Insurance; Holly McCalmont, human resources manager, Business Insurance; Jim Norris, business technology solutions manager, Business Insurance; Craig Lowenthal, first vice president and chief information officer, Hartford Financial Products; and Susan Miranda, support services manager, Hartford Specialty Co.\n11\n/H17074 J ohn Belisle, right, is senior vice president of Oswald, Trippe and Company, Inc. in Fort Myers, Fla., one of The Hartford's largest sellers of Select Customer commercial insurance. David van der Merwe, president of electronics manufacturer Saftronics, Inc., depends on him for reliable counsel, as well as products tailored to Saftronics' business.\n/H17075 T he Hartford signed a new eightyear contract, beginning Jan.1, 2002, to continue its highly successful relationship with AARP. Property & Casualty Operations President and CEO Dave Zwiener, second from left, works closely with, left to right, Bill Farris, director, financial products, AARP Services, Inc.; Leisha Spaulding, manager, financial products, AARP Services, Inc.; and Steve Zaleznick, CEO, AARP Services, Inc.", - "page_start": 12, - "page_end": 13, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nBecause The Hartford quotes and issues this business online (and added online billing in 2001), acquisition and processing costs are 15 to 20 percent lower than those of traditional direct-marketing or face-toface sales. Because of this and other factors, the expense ratio for AARP business is 30 percent below that of the industry in general. And the customer renewal rate is 96 percent, versus the industry's 88 percent, making the AARP program yield some of the most profitable auto business The Hartford writes.\nThe relationship also has The Hartford thinking ahead toward new business and an even stronger relationship with AARP members. The Hartford can crossmarket auto insurance to homeowner's customers and homeowner's insurance to auto customers, which presents a tremendous growth opportunity. In addition,\nThe Hartford is committed to providing value to AARP members in many ways. An example: The Hartford and AARP work with the MIT Age Lab to produce information-available in print and on both partners' Web sites-advising AARP members about Alzheimer's disease and other forms of dementia as they affect driving ability. The information guides caregivers struggling with difficult decisions about family members' safety behind the wheel. The resource-a customer solution like no other-helps enhance the superior value The Hartford provides to AARP members.\nAlthough it's the most comprehensive, the AARP relationship isn't The Hartford's only affinity program. The company also has affinity arrangements with USAA and other companies. Regardless of the program's size, the affinity partners share the right qualities: strong name-brand recognition, first-class marketing and a broad and loyal customer base.\nIn other words, they share some of The Hartford's core attributes.\n14\n/H17076 T he Campbell Agency in Byron Center, Mich., found that by aligning its organization to mirror that of The Hartford, the two partners could work more closely-and grow more-together. For example, The Campbell Agency emulated The Hartford by dedicating a team to the small-business market.\nThat made the agency more proficient at identifying potential customers and setting sales targets, according to Mary Lou Barna, vice president, sales and marketing. In other words, she says, the partnership with The Hartford has made Barna and her colleagues better managers.", - "page_start": 15, - "page_end": 16, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "the\n/H17073 T he Hartford's acquisition of Fortis Financial Group in 2001 enhanced the company's market share and distribution advantage. Most importantly, the acquisition brought into The Hartford's family powerful sales professionals like Allen Chinoy of Darien, Ill., left, the nation's fifthleading producer of The Hartford's variable universal life insurance. Chinoy is a vocal supporter of Hartford Investor, which makes it easier for him to show customers such as Dr. Dilip Patel how his portfolio is performing.\n/H17075 J oe Smith, right, and Kim Connolly, left, are a brother-sister team heading Smith Brothers Insurance, Inc. of Glastonbury, Conn. These VIP agents are enthusiastic users of The Hartford's Electronic Business Center (EBC) and other technological tools for propertycasualty agents. They piloted the EBC and have given valuable feedback to Senior Commercial Underwriter Tracey Kamenash and others at The Hartford to help develop the EBC standards and navigational model.\n22\nmore incentive to look to The Hartford for the right products to offer their clients.\nThe Hartford's Group Benefits Division's (GBD) Producer View Web portal enables group benefits brokers to manage their books of business and track commissions and premium payments online. It's also a resource for product brochures and other marketing material. GBD's Employer View portal meets benefits managers' increasing demands for self-service. In 2001 GBD added online billing capability to the portal, which also features access to forms and status reports on premium payments and claims, among other functions.\nThe property-casualty operation's Electronic Business Center (EBC) has transformed the way agents do business. They can obtain quotes almost instantly, check billing and loss information, track claims payments and perform a host of other daily tasks. Because it's their virtual back office, agents have more time to do what's right for them: build their business. The EBC is proving especially valuable in the high-growth smallbusiness market, where service is as important as price.\nThe EBC saves hours of administrative time, allowing agents to sell commercial insurance products much more profitably.", - "page_start": 23, - "page_end": 24, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "When did the annual sherholder meeting of Hartford happen in 2002 ?", - "target_page": 38, - "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Corporate Information\nCorporate Headquarters\nThe Hartford Financial Services Group, Inc. 690 Asylum Avenue Hartford, Connecticut 06115 860-547-5000\nInternet Address\nhttp://www.thehartford.com\nAnnual Meeting\nShareholders are cordially invited to attend The Hartford's Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens Theater at The Hartford Financial Services Group, Inc.'s home office at 690 Asylum Avenue, Hartford, Connecticut. Shareholders of record as of February 28, 2002 are entitled to notice of, and to vote at, the Annual Meeting.", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Insurance Financial Strength Ratings\nHartford Fire, A.M. Best = A+. Hartford Fire, Fitch = AA. Hartford Fire, Standard & Poor's = AA. Hartford Fire, Moody's = Aa3. Hartford Life Insurance Company, A.M. Best = A+. Hartford Life Insurance Company, Fitch = AA+. Hartford Life Insurance Company, Standard & Poor's = AA. Hartford Life Insurance Company, Moody's = Aa3. Hartford Life & Accident, A.M. Best = A+. Hartford Life & Accident, Fitch = AA+. Hartford Life & Accident, Standard & Poor's = AA. Hartford Life & Accident, Moody's = Aa3. Hartford Life & Annuity, A.M. Best = A+. Hartford Life & Annuity, Fitch = AA+. Hartford Life & Annuity, Standard & Poor's = AA. Hartford Life & Annuity, Moody's = Aa3\nFor additional information, see the Company's Annual Report on Form 10-K.\n34", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "The Hartford Financial Services Group, Inc.\n2001 Summary Annual Report\nThere's only", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "products & services\nH ow do you secure the future when the present is puzzling enough? It's a big challenge, and The Hartford's primary objective. Everything we do is designed to help our customers deal with the uncertainties that lie ahead.\nThe Hartford believes the best way to secure the future is to provide customers with the right products, and then back those products with outstanding performance and great service. Staying focused on this objective was never more important-or more challenging-than in 2001.\nTrue to form, The Hartford's life operations' annuities and mutual funds delivered high-quality performance in a time of market turmoil. Despite an anemic stock market, 87 percent of the funds in The Hartford's Director variable annuity remained in the first or second quartile of three-year returns within the Lipper Peer Group in 2001. Sixty-four percent of the funds in the Leaders suite of annuities and 91 percent of The Hartford's mutual funds remained in the first or second quartile over the three-year period.\nThe ability to deliver that kind of performance can be traced to our money managers-Wellington Management Co., American Funds, Franklin Templeton Investments, MFS Investment Management, AIM Funds Management, Inc., Putnam Investment Management and The Hartford's own Hartford Investment Management Co.\nAll of The Hartford's money managers have years of experience and are among the most respected firms in the industry. Their experience and expertise were especially important during the market volatility we saw in 2001. They always stay focused on long-term performance, which is the true measuring stick of The Hartford's value to its customers.\nBesides outstanding products and excellent management, great service is a critical component in delivering the right solutions to our customers. In 2001, The Hartford won an unprecedented sixth consecutive DALBAR Annuity Service Award, as well as the\n17\nIntermediary Service Award and the first-ever Life Insurance Service Award. The triple win reflected the overall excellence of The Hartford's service, a natural complement to the company's quality products. DALBAR also recognized The Hartford's mutual funds as the industry leader in several categories, including investment management.", - "page_start": 18, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nFuture generations will measure the full impact of Sept. 11. But at The Hartford, one thing is known already. As they did after disasters such as the New York fire of 1835, the Chicago fire of 1871 and the 1906 San Francisco earthquake, The Hartford's people in 2001 ran their business the only way they know howthe right way. They put customers first and kept promises. In so doing, they helped lay the foundation for a more confident future.\n/H17076 N ew York employees admire a painting depicting the courage and resilience of The Hartford employees and the New York rescue teams. The montage, which now hangs in the lobby of The Hartford's New York offices, was painted by Andy Yelenak of The Hartford's Information Technology department.\n/H17073 T he Hartford's New York staff got their businesses back up and running in less than a week after the Sept. 11 attack, despite the destruction of their offices. Among those who were instrumental in getting 330 employees situated in temporary office space were, left to right, Lucille T. Sgaglione, vice president, Hartford Financial Products; Linda Banks, administrative assistant, office support\nservices, Business Insurance; Holly McCalmont, human resources manager, Business Insurance; Jim Norris, business technology solutions manager, Business Insurance; Craig Lowenthal, first vice president and chief information officer, Hartford Financial Products; and Susan Miranda, support services manager, Hartford Specialty Co.\n11\n/H17074 J ohn Belisle, right, is senior vice president of Oswald, Trippe and Company, Inc. in Fort Myers, Fla., one of The Hartford's largest sellers of Select Customer commercial insurance. David van der Merwe, president of electronics manufacturer Saftronics, Inc., depends on him for reliable counsel, as well as products tailored to Saftronics' business.\n/H17075 T he Hartford signed a new eightyear contract, beginning Jan.1, 2002, to continue its highly successful relationship with AARP. Property & Casualty Operations President and CEO Dave Zwiener, second from left, works closely with, left to right, Bill Farris, director, financial products, AARP Services, Inc.; Leisha Spaulding, manager, financial products, AARP Services, Inc.; and Steve Zaleznick, CEO, AARP Services, Inc.", - "page_start": 12, - "page_end": 13, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "the\n/H17075 K wadwo Dankyi-Ampadu, service representative, personal lines, takes customer phone calls in The Hartford's Southington, Conn., customer call center. It's one of three AARP call centers throughout the United States.\nN ew technology tools made The Hartford Experiencecustomer solutions, ease of doing business and extraordinary service-more real than ever for our customers in 2001.\nIt was a year that saw the debut of life operations' Hartford Investor Web portal, expanded Web portals for group benefits administrators, and enhancements to technology for The Hartford's property-casualty agents and customers.\nHartford Investor is both a versatile personal assistant and an aid in wholesaling, especially for the independent financial planner channel. Broker-dealers and financial advisors can use it to research The Hartford's full complement of individual life and investment products, update their books of business in seconds, track daily fund performance, run financialplanning models, receive online product training, produce customized presentations and even submit business electronically.\nIn short, the portal allows The Hartford to bring products and functions from a variety of sources into one convenient online environment.\nHartford Investor has two strategic objectives: One, deepen current intermediaries' loyalty to The Hartford by extending The Hartford Experience right to their desktops. Two, expand the network of intermediaries by giving them the technological support they need to grow their businesses.\nMore than 153,000 licensed intermediaries-from solo advisors to members of large financial institutions-are appointed to sell The Hartford's products. Yet fewer than 60,000 actively write business for the company. The untapped potential is vast, especially among independents, the fastest-growing distribution channel and the only one in which The Hartford doesn't hold the largest market share.\nThat's bound to change. With Hartford Investor available on their desktops, intermediaries will have far\n21", - "page_start": 21, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Transfer Agent/Shareholder Records\nFor information or assistance regarding stock records, dividend checks or stock certificates, please contact The Hartford's transfer agent:\nThe Bank of New York Shareholder Relations Department-11E P.O. Box 11258 Church Street Station New York, NY 10286 800-254-2823\nTo send certificates for transfer and address changes:\nThe Bank of New York Receive and Deliver Department-11W P.O. Box 11002 Church Street Station New York, NY 10286\nAddress inquiries about The Hartford's Dividend Reinvestment and Cash Payment Plan to:\nThe Bank of New York Dividend Reinvestment Department P.O. Box 1958 Newark, NJ 07101-9774\nE-mail: shareowner-svcs@bankofny.com\nInternet address: www.stockbny.com\n36\nInvestor Relations\nThe Hartford Financial Services Group, Inc. Hartford Plaza, HO-1-01 Hartford, Connecticut 06115 Attn: Investor Relations\n860-547-2537\nMedia Inquiries\nThe Hartford Financial Services Group, Inc. Media Relations Hartford Plaza, T-12-56 Hartford, CT 06115 860-547-5200", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\n'P artnering' is a popular business buzzword that may vanish as quickly as it appeared. The Hartford's partnerships, on the other hand, are built for the long term and have played a major role in the company's growth and success.\nThe company enjoys outstanding partnerships with several of the world's top asset managers. It also values its thousands of relationships with financial intermediaries such as large broker-dealers, banks and independent financial planners-and with affinity partners who extend The Hartford's reach into large, growing markets.\n'A lot of people talk about having the right partners, but The Hartford views it differently from most,' says Gary Trippe, CEO of Fort Myers, Fla., propertycasualty agency Oswald, Trippe and Company, Inc. 'They look for partners who share their core values, and the relationship is based on trust and respect. It's all about compatibility.' Trippe should know. His\nagency writes three times as much business with The Hartford, in both personal and commercial lines, as it writes with any other insurer.\nMutually beneficial partnerships with successful businesses of all sizes are the foundation of The Hartford's business model.\nPerhaps no relationship represents shared values and shared success better than the one with AARP, which signed a new eight-year contract with The Hartford that began Jan. 1, 2002. The AARP insurance program with The Hartford is a model of affinity marketing and distribution savvy. AARP's membershipthose age 50 and over-is the fastest-growing segment of the U.S. population. Computer use among this group is growing by an estimated 20 percent per year, and the population segment respects established brands and seeks value, convenience and extraordinary service.\nThat right combination of factors helps make AARP's World Wide Web site one of The Hartford's\n13\nmost dynamic sources of business growth. In 2001 the company's link to AARP's Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet.", - "page_start": 14, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nBecause The Hartford quotes and issues this business online (and added online billing in 2001), acquisition and processing costs are 15 to 20 percent lower than those of traditional direct-marketing or face-toface sales. Because of this and other factors, the expense ratio for AARP business is 30 percent below that of the industry in general. And the customer renewal rate is 96 percent, versus the industry's 88 percent, making the AARP program yield some of the most profitable auto business The Hartford writes.\nThe relationship also has The Hartford thinking ahead toward new business and an even stronger relationship with AARP members. The Hartford can crossmarket auto insurance to homeowner's customers and homeowner's insurance to auto customers, which presents a tremendous growth opportunity. In addition,\nThe Hartford is committed to providing value to AARP members in many ways. An example: The Hartford and AARP work with the MIT Age Lab to produce information-available in print and on both partners' Web sites-advising AARP members about Alzheimer's disease and other forms of dementia as they affect driving ability. The information guides caregivers struggling with difficult decisions about family members' safety behind the wheel. The resource-a customer solution like no other-helps enhance the superior value The Hartford provides to AARP members.\nAlthough it's the most comprehensive, the AARP relationship isn't The Hartford's only affinity program. The company also has affinity arrangements with USAA and other companies. Regardless of the program's size, the affinity partners share the right qualities: strong name-brand recognition, first-class marketing and a broad and loyal customer base.\nIn other words, they share some of The Hartford's core attributes.\n14\n/H17076 T he Campbell Agency in Byron Center, Mich., found that by aligning its organization to mirror that of The Hartford, the two partners could work more closely-and grow more-together. For example, The Campbell Agency emulated The Hartford by dedicating a team to the small-business market.\nThat made the agency more proficient at identifying potential customers and setting sales targets, according to Mary Lou Barna, vice president, sales and marketing. In other words, she says, the partnership with The Hartford has made Barna and her colleagues better managers.", - "page_start": 15, - "page_end": 16, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Dear Fellow Shareholders,\n'Focused resolve' is how New York-based Regional Vice President Brandon Hickey characterizes The Hartford's response. 'It solidified in my mind how strong the culture is at this company,' he says. 'The emotional stress of Sept. 11 will be with us for a long time. But as a tribute to the people who were there, we came back as quickly as we did because we knew we\nhad a job to do, and we were committed to succeed.'\n10\nBy early November-less than 60 days after the attack-The Hartford's New York employees were in their new permanent offices at 2 Park Ave.\nNo less impressive-and certainly no less swiftwas The Hartford's claims service during Sept. 11's aftermath. 'Catastrophe Team'-CAT-adjusters were on the ground within days, fulfilling obligations to policyholders who suffered losses. As an example, The Hartford advanced $1 million within 72 hours of the disaster to help the Thacher, Proffitt & Wood law firm establish temporary midtown Manhattan offices. All the firm's employees had evacuated the World Trade Center's south tower before everything in their offices was destroyed. Within a week, Thacher, Proffitt & Wood was back in business.\nThe Hartford assigned extra resources to expedite service requests, and customers received premium payment extensions as needed. One adjuster wrote a $250,000 check on the spot to help a lower Manhattan software-development company begin its recovery. CAT team members and call center customer service representatives received special training to help them cope with traumatized customers, and the company distributed disaster-recovery literature and forms to help customers get back to business.\nThe Hartford's Group Benefits Division (GBD) offered crisis-counseling services to policyholders in\nthe New York metropolitan area. In order to speed the payment of claims, GBD employees immediately contacted customers with offices in the towers and worked with industry organizations to expedite the issuing of death certificates.\nThe Hartford's individual life operations scoured airline manifests and missing-persons lists, looking for names of customers. When they spotted a potential match, they called agents to alert them to a possible claim and provided tips on how to proceed.", - "page_start": 11, - "page_end": 12, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "Regarding climate change, to what corresponds the \"average length of flood events ?", - "target_page": 11, - "target_passage": "The average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nClimate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting di GLYPH<11> erent aspects of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n13 of 22\nissues and re-constructing them di GLYPH<11> erently. By comparing the persistent words used related to the two discourses in the 10-year period in Table 2, we think that global warming showed a relative preference toward general descriptions or slogans, such as 'earth' and 'pollution', whereas 'climate change' was more associated to specific issues like 'solar', 'coal', 'china', and 'food'.\nStudies have suggested that the public shows a preference for scientific publications with general keywords compared with those with complicated scientific jargon [47], lacking a deep understanding of the complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions seem to suit global warming more than climate change according to the current study, which is probably because climate change receives more publicity and recognition than global warming in the scientific community. In the association network shown in Figure 2, global warming was found to be more connected with temperature abnormalities. This finding is in accordance with studies reporting that short-term temperature anomalies [87] can increase the public's belief about global warming by increasing the understanding of this abstract issue [88], although scientists mostly make judgments based on long-term weather statistics [89]. However, none of the four words, 'snow', 'summer', 'winter', or 'heatwave' in the temperature theme of global warming were ranked in the top 50 nodes list of the climate change network.", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "1. Introduction\nThe public's distinct understanding of the cause and e GLYPH<11> ect of the global climate issue is an obstacle to joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], previous studies noticed that the public had even failed to reach an agreement on whether 'climate change' or 'global warming' is the most appropriate definition of the global climate concern [3-5]. According to the definition provided by [6], global warming describes global climate issues as a continuous increase in the average temperature of Earth's surface due to anthropogenic emissions of greenhouse gases, whereas climate change includes not only temperature rise but also a range of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062; doi:10.3390 / ijerph17031062\nwww.mdpi.com / journal / ijerph\n/gid00001\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n2 of 22\ncomplex changes in the state of the climate [7], which may be caused by natural process, external forces, or human interventions [8]. By randomly assigning respondents to climate change or global warming questionnaires, scholars confirmed that the di GLYPH<11> erent connotations contained in the two definitions are likely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which may inhibit collaboration and joint e GLYPH<11> orts to mitigate the global challenge.\nPublic preference between climate change and global warming is even more apparent when considering the ideology spectrum [10]. Some scholars concluded that conservatives, who are less concerned with environmental issues, tended to use global warming as a narrative strategy because global warming has a more direct connection with temperature rise, making it easier to find contradictory cues such as freezing weather or heavy snowstorms to deny global climate change facts [11]. The associations between global warming and human activities may contribute to more controversies as well [12], connecting global warming more with the 'hoax' frame [5] and evoking greater negative sentiment [13].", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "Author for correspondence:\nModel Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration scenario. To provide more detailed representations of climate processes and impacts, the spatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution than the CMIP5 models. We used a set of impacts-relevant indices and a global land surface model to examine the projected changes in weather extremes and their implications for freshwater availability and vulnerability to food insecurity. Uncertainties in regional climate responses are assessed, examining ranges of outcomes in impacts to inform risk assessments. Despite some degree of inconsistency between components of the study due to the need to correct for systematic biases in some aspects, the outcomes from different ensemble members could be compared for several different indicators. The projections for weather extremes indices and biophysical impacts quantities support expectations that the magnitude of change is generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with increases being more intense than seen in CMIP5 projections. Precipitation-related extremes show more geographical variation with some increases and some decreases in both heavy precipitation and drought. There are substantial regional uncertainties in hydrological impacts at local scales due to different climate models producing different outcomes. Nevertheless, hydrological impacts generally point towards wetter conditions on average, with increased mean river flows, longer heavy rainfall events, particularly in South and East Asia with the most extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global warming. Some areas are projected to experience shorter meteorological drought events and less severe low flows, although longer droughts and/or decreases in low flows are projected in many other areas, particularly southern Africa and South America. Flows in the Amazon are projected to decline by up to 25%. Increases in either heavy rainfall or drought events imply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this vulnerability is projected to remain smaller than at 2°C global warming in approximately 76% of developing countries. At 2°C, four countries are projected to reach unprecedented levels of vulnerability to food insecurity.\nThis article is part of the theme issue 'The Paris Agreement: understanding the physical and social challenges for a warming world of 1.5°C above pre-industrial levels'.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\n-\ndays were projected to exceed the baseline 10th percentile, at 1.5°C this reduces by 15-20% or more. Again, the patterns of change at 1.5°C retain a similar geographical pattern of greater increases in the tropics than mid-latitudes (electronic supplementary material).\n17\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nFigure 12. Comparison of global mean changes in climate extremes indices relative to 1981-2010 at 2 ° Cand1.5 ° Cglobal warming for individual ensemble members and ensemble mean. ( a ) Change in annual daily maximum temperature; ( b ) percentage of days with maximum temperature above 90th percentile for 1981-2010; ( c ) change in consecutive dry days; ( d ) change in annual maximum 5-day rainfall.\nFor precipitation, generally similar changes are seen at 1.5°C global warming as at 2°C, but smaller in magnitude (compare figures 16 and 4), suggesting that most of these changes are a response to radiatively forced climate change as opposed to internal climate variability. However, some localized changes do vary in sign between the GWLs, such as in South Australia, suggesting a possible dominance of internal variability over the global warming signal in these places.\nWhere Rx5day increases, the increases are projected to be larger-in some cases approximately double-at 2°C global warming than 1.5°C. Where Rx5day decreases, again the decreases are projected to be larger at 2°C global warming than 1.5°C (figure 17).", - "page_start": 16, - "page_end": 17, - "source_file": "pubmed11.pdf" - }, - { - "text": "References\n1. Angélil, O. et al. An independent assessment of anthropogenic attribution statements for recent extreme temperature and rainfall events. J. Clim. 30 (1), 5-16 (2017).\n2. Rosenzweig, C. et al. Coordinating AgMIP data and models across global and regional scales for 1.5°C and 2.0°C assessments. Philos. Trans. R. Soc. A. 376 , 20160455 (2018).\n3. Mitchell, D. et al. Half a degree additional warming, prognosis and projected impacts (HAPPI): Background and experimental design. Geosci. Model Dev. 10 , 571-583 (2017).\n4. Coumou, D. & Rahmstorf, S. A decade of weather extremes. Nat. Clim. Change 2 , 491-496 (2012).\n5. IPCC: Summary for Policymakers. In Climate Change 2013: /T_he Physical Science Basis. Contribution of Working Group I to the Fi/f_th Assessment Report of the Intergovernmental Panel on Climate Change 4-6 (Cambridge University Press, 2013).\n6. Di/ffenbaugh, N. S. et al. Quantifying the in/fluence of global warming on unprecedented extreme climate events. PNAS 114 (19), 4881-4886 (2016).\n7. Tai, A. P. K., Martin, M. V. & Heald, C. L. /T_hreat to future global food security from climate change and ozone air pollution. Nat. Clim. Change 4 , 817-821 (2014).\n8. Román-Palacios, C. & Wiens, J. J. Recent responses to climate change reveal the drivers of species extinction and survival. PNAS 117 (8), 4211-4217 (2020).\nͷ͸\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed9.pdf" - }, - { - "text": "Sea level rise. Storm surge. Past event case studies.\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include an estimate of the year-to-year changes in sea level rise and a 'plausible but highly unlikely' scenario known as H++. A new feature of UKCP18 will be assessing the credibility of making sea level rise projections to 2300. The projections will use the latest information from the CMIP5 models and application of the methods used in the Intergovernmental Panel on Climate Change's (IPCC) Fifth Assessment Report 10 .\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change in high water levels over the 21st Century. These estimates will be based on a combination of projected mean sea level change and projections of change in the extremes due to changes in atmospheric storminess. These 'storminess' projections will use the same surge model used in operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to drive the surge. New understanding of the modification of large-scale sea level change signals as they pass from the open ocean onto the shelf sea around the UK will be incorporated into the UKCP18 marine projections. UKCP18 will also include storm surge historical case studies derived from applying plausible future sea level change to historical extreme events.\n8 The latest update can be found at http://www.metoffice.gov.uk/climate/uk/about/state-of-climate\n9 http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/\n10 https://www.ipcc.ch/report/ar5/", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "1. Introduction\nWe examine the implications of our new climate projections by applying some commonly used indices of climate extremes, and a further index quantifying relative vulnerability to food insecurity which combines climate extremes indices with information on a range of factors representing sensitivity and adaptability of food systems to climate hazards. We also use the climate projections to drive a global land surface model to simulate changes in run-off as an indicator of freshwater availability. We assess whether regional extremes are projected to increase or decrease at 2°C global warming, and whether the consequent impact on drought and vulnerability to food insecurity become greater or smaller. We also assess whether these changes are reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these projections, and, in particular, examine whether the use of ensemble-mean projections is a useful simple guide to impacts projections or whether this can lead to a misleading impression for some impacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming at 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change. Wealso consider our climate-change impacts results in comparison with other studies using older, lower-resolution climate projections.\nA large number of previous studies have assessed potential impacts of future climate change using the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [7], and some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [8,9]. We also base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere model to provide greater spatial detail and improved representation of atmospheric processes.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "References\n40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whit/field, S. & Das, B. Current warming will reduce yields unless maize breeding and seed systems adapt immediately. Nat. Clim. Change 6 , 954-958 (2016).\n41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the Southeastern US. Clim. Change 134 , 311-326 (2016).\n42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS 116 (10), 4194-4199 (2019).\n43. Urban, D. W., She/ffield, J. & Lobell, D. B. /T_he impacts of future climate and carbon dioxide changes on the average and variability of US maize yields under two emission scenarios. Environ. Res. Lett. 10 , 045003 (2015).\n44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C Above Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global Response to the /T_hreat of Climate Change, Sustainable Development, and E/fforts to Eradicate Poverty 32 (World Meteorological Organization, 2018).\n45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for gap-/filling and historical climate series estimation. Agr. For. Meteorol. 200 , 233-248 (2015).\n46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth Syst. Dyn. 4 , 219-236 (2013).\n47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological types, and net primary production in the year 2000. Glob. Biogeochem. Cycles 22 , 1022 (2008).", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - }, - { - "text": "(d) Freshwater resources: run-o/ff\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem-hydrology-surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way, typically applied at global scales. Variants of JULES form the land surface scheme of Met Office Hadley Centre Earth System Models [26,27] and have been used to assess impacts of climate change on global terrestrial ecosystems and hydrology [28-30] within such models. JULES can also be used outside of the Earth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of a wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of JULES on a global grid of 0.5° resolution [31].\nIt has been noted that hydrological impacts models driven by climate-change projections from climate models tend to give more severe drying than simulated in the climate models themselves [32-34]. This is largely attributed to the inclusion of plant stomatal closure in response to elevated CO2 in the climate model land surface schemes, which generally reduces evapotranspiration relative to climate projections without this process and hence further increases run-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard hydrological models. Plant physiological responses to CO 2 are included in the JULES model, so our projections of changes in run-off here do account for this process.\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to the effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We analysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to pre-industrial. We examined changes in both mean flows and low flows (defined as the flows for the lowest 10% of time).", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "What is the projected situation of India regarding HCVI (Hunger and Climate Vulnerability Index)?", - "target_page": 12, - "target_passage": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nFigure 1. Hunger and Climate Vulnerability Index for 1981-2010 climate (ensemble mean across the bias-corrected HadGEM3 ensemble).\nTable 2. Proxies for /flood and drought events used in the HCVI.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed11.pdf" - }, - { - "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nTo assess implications of climate change for vulnerability to food insecurity, we used an adaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed by the United Nations World Food Programme to provide a country-level assessment of vulnerability to food insecurity as a result of climate-related events. We used a new iteration of the HCVI which makes use of gridded climate model projections to understand the impact of climate change on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios of adaptation investment [23]. This iteration of the HCVI only considers in-country production of food and does not account for food trade. For this reason, the HCVI is only calculated for 122 developing and least-developed countries (defined here as countries not in the OECD or EU which can be resolved by the scale of the climate model; i.e. larger than 500 km 2 ).\nThe index provides quantification at the national level across the globe of the scale and direction of impact of climate change on food insecurity. As such, it aims to provide the following: (i) information to help policy-makers understand the level of challenge to global food security that climate change presents; (ii) information on the geography of the impacts and help to evaluate the relative benefits of mitigation and adaptation responses.\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the nature of the top-level threat to food insecurity that climate change presents, thereby supporting prioritization of effort.\nThe HCVI consists of three equally weighted components: exposure to climate-related hazards, sensitivity of national agricultural production to climate-related hazards, and adaptive capacitya measure of a country's ability to cope with climate-related food shocks. The sensitivity and adaptive capacity components are based on data from the World Bank, World Resources Institute,\n5\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nUN Food and Agriculture Organization, UN Development Programme and UN Population Fund [22]. The exposure component comprised proxies for the average length of flood and drought events calculated with daily precipitation data [23] (table 2). These proxies were chosen above other possible metrics as they were required to replace self-reported instances of flood and drought events used in the original HCVI, which correlate with undernutrition data at the country-level [23]. The proxies were therefore masked to only include data where a significant proportion of people live and grow crops before aggregating to country level and combining to comprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone may not always be adequate for representing flood and drought events, so the current method is regarded as preliminary.\nThe impacts of projected climate change, therefore, act through changes in these quantities. In the current version of the HCVI, climate-change impacts on other quantities such as crop yield are not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at present-day conditions.\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected HadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values calculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable regions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables inclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.\n6\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nIn the present study, processing errors in the input data for one ensemble member, the HadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the HCVI are, therefore, not presented here.", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nOf the 122 countries assessed, 93 have smaller ensemble-mean HCVI calculated at 1.5°C global warming than at 2°C, indicating an ensemble consensus that 76% of assessed countries would see a smaller increase in vulnerability to food insecurity if global warming were limited to 1.5°C (figures 18 and 19). Conversely, 24% of countries would, by this metric, see the same or higher vulnerability to food insecurity at 1.5°C than 2°C. Of these, some are countries where HCVI is projected to be lower at 2°C global warming than in the baseline. For example, in Mali the ensemble-mean baseline HCVI of 0.83 increased slightly to 0.85 at 1.5°C then reduced to 0.81 at 2°C. In some countries, the ensemble-mean HCVI happened to be identical at both warming levels. In Chad, for example, the baseline HCVI of 0.89 increased to 0.91 at both 1.5°C and 2°C.\nAs noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen in the baseline, and this number increased to seven at 1.5°C. The same four countries with 'unprecedented' HCVI values at 2°C also saw 'unprecedented' values at 1.5°C; these were Oman, Bangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as having 'unprecedented' values at 1.5°C. The role of internal climate variability in the HCVI results needs to be assessed, as does the effect of potential nonlinear interactions between the flood and drought metric. Until the reasons behind these country-specific results are understood,\n18\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed11.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nThe ensemble members showed broadly consistent changes in HCVI at 2°C global warming, with increases in most assessed countries and generally similar sets of countries experiencing the largest and smallest changes. Southeastern Africa consistently showed larger increases in HCVI than Central Africa, due to increased length of drought events projected in all ensemble members (not shown). The length of flood events was not projected to increase in this region. The Sahel region consistently showed one or more countries with a small decrease in the HCVI, although the precise country or countries varied between ensemble members. The decrease in HCVI here was due to projected decreases in length of drought, with length of flood events projected to change little.\nIndia is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members.\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble members. Although the location of projected longer flood events varies across the country in different members, the aggregation of the HCVI to the country level renders this geographical variability irrelevant for such a large country because only the median value across the country is used in the HCVI. Some ensemble members project longer drought for Brazil, which again contributed to increased HCVI.\nHadGEM2-ES\n12\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed11.pdf" - }, - { - "text": "1. Introduction\nWe examine the implications of our new climate projections by applying some commonly used indices of climate extremes, and a further index quantifying relative vulnerability to food insecurity which combines climate extremes indices with information on a range of factors representing sensitivity and adaptability of food systems to climate hazards. We also use the climate projections to drive a global land surface model to simulate changes in run-off as an indicator of freshwater availability. We assess whether regional extremes are projected to increase or decrease at 2°C global warming, and whether the consequent impact on drought and vulnerability to food insecurity become greater or smaller. We also assess whether these changes are reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these projections, and, in particular, examine whether the use of ensemble-mean projections is a useful simple guide to impacts projections or whether this can lead to a misleading impression for some impacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming at 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change. Wealso consider our climate-change impacts results in comparison with other studies using older, lower-resolution climate projections.\nA large number of previous studies have assessed potential impacts of future climate change using the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [7], and some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [8,9]. We also base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere model to provide greater spatial detail and improved representation of atmospheric processes.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "Author for correspondence:\nModel Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration scenario. To provide more detailed representations of climate processes and impacts, the spatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution than the CMIP5 models. We used a set of impacts-relevant indices and a global land surface model to examine the projected changes in weather extremes and their implications for freshwater availability and vulnerability to food insecurity. Uncertainties in regional climate responses are assessed, examining ranges of outcomes in impacts to inform risk assessments. Despite some degree of inconsistency between components of the study due to the need to correct for systematic biases in some aspects, the outcomes from different ensemble members could be compared for several different indicators. The projections for weather extremes indices and biophysical impacts quantities support expectations that the magnitude of change is generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with increases being more intense than seen in CMIP5 projections. Precipitation-related extremes show more geographical variation with some increases and some decreases in both heavy precipitation and drought. There are substantial regional uncertainties in hydrological impacts at local scales due to different climate models producing different outcomes. Nevertheless, hydrological impacts generally point towards wetter conditions on average, with increased mean river flows, longer heavy rainfall events, particularly in South and East Asia with the most extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global warming. Some areas are projected to experience shorter meteorological drought events and less severe low flows, although longer droughts and/or decreases in low flows are projected in many other areas, particularly southern Africa and South America. Flows in the Amazon are projected to decline by up to 25%. Increases in either heavy rainfall or drought events imply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this vulnerability is projected to remain smaller than at 2°C global warming in approximately 76% of developing countries. At 2°C, four countries are projected to reach unprecedented levels of vulnerability to food insecurity.\nThis article is part of the theme issue 'The Paris Agreement: understanding the physical and social challenges for a warming world of 1.5°C above pre-industrial levels'.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher than any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. The implication of such HCVI values is that climate change at 2°C is projected to cause levels of vulnerability to food insecurity that are greater than any seen in the present day. For individual ensemble members, the number of countries with 'unprecedented' HCVI values at 2°C varies from three to seven. Conversely, many countries in the baseline climate have levels of vulnerability to food insecurity that are greater than those expected in other countries under 2°C global warming. This suggests that other factors are already posing greater risk for food insecurity than 2°C climate change is expected to cause in other countries, so the increased risk from climate change should not overshadow the need to reduce vulnerability to food insecurity arising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by addressing various socio-economic issues in such counties.\nThe JULES simulations show a general tendency towards increased run-off over approximately half of the land surface (figure 9) and the majority of the major river basins assessed (figure 10), but with large regional uncertainties including the possibility of decreased flows in many basins. The ensemble-mean change in mean streamflow shows an increase of between 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing an increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and southcentral USA, which see less than a 5% change in run-off, and the already very dry region of the Sahara Desert where the existing very small run-off become even smaller.\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with the regions seeing an increase in mean run-off seeing a larger percentage increase in low run-off-over 75% increases over much of North America, Eastern Europe and Asia. Note that this does not necessarily imply a larger increase in absolute low flow compared to absolute mean flow, because the baseline is (by definition) smaller for low flows. In western Europe, where the changes in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5\nGFDL-ESM2M\n14", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nvulnerability to food insecurity\n-0.2\n0.2\n0.4\n0.6\n0\n0.8\n1.0\n1.2\n1.4\nFigure 18. Hunger and Climate Vulnerability Index at 1.5 ° C global warming (ensemble mean).\nIPSL-CM5A-LR\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nFigure19. Di/fference in Hunger and Climate Vulnerability Index between 2 ° Cand1.5 ° Cglobalwarming,forindividualensemble members and ensemble mean.", - "page_start": 20, - "page_end": 21, - "source_file": "pubmed11.pdf" - }, - { - "text": "Research\nCite this article: Betts RA et al . 2018 Changes in climate extremes, fresh water availability and vulnerability to food insecurity projected at 1.5 ° Cand2 ° C global warming with a higher-resolution global climate model. Phil. Trans. R. Soc. A 376 : 20160452.\nhttp://dx.doi.org/10.1098/rsta.2016.0452\nAccepted:13February2018\nOne contribution of 20 to a theme issue 'The Paris Agreement: understanding the physical and social challenges for a warming world of 1.5 ° C above pre-industrial levels'.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "Regarding climate change simulation, what is JULES ?", - "target_page": 7, - "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(d) Freshwater resources: run-o/ff\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem-hydrology-surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way, typically applied at global scales. Variants of JULES form the land surface scheme of Met Office Hadley Centre Earth System Models [26,27] and have been used to assess impacts of climate change on global terrestrial ecosystems and hydrology [28-30] within such models. JULES can also be used outside of the Earth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of a wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of JULES on a global grid of 0.5° resolution [31].\nIt has been noted that hydrological impacts models driven by climate-change projections from climate models tend to give more severe drying than simulated in the climate models themselves [32-34]. This is largely attributed to the inclusion of plant stomatal closure in response to elevated CO2 in the climate model land surface schemes, which generally reduces evapotranspiration relative to climate projections without this process and hence further increases run-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard hydrological models. Plant physiological responses to CO 2 are included in the JULES model, so our projections of changes in run-off here do account for this process.\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to the effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We analysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to pre-industrial. We examined changes in both mean flows and low flows (defined as the flows for the lowest 10% of time).", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed11.pdf" - }, - { - "text": "(a) Global climate simulations at 1.5 ° Cand2 ° Cglobalwarming\nWe ran the model using only its atmosphere and land components, with time-varying seasurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This approach was taken for two reasons: (i) to provide a rapid first analysis of the implications of the higher resolution for projections of climate extremes and impacts-an atmosphereonly simulation requires considerably less computing time than a coupled ocean-atmosphere general circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in regional climate changes by using SSTs and SICs from different climate models. To explore these uncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric simulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 with the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial influence on regional patterns of climate change over land, so using a range of SST and SIC patterns in a single atmosphere model goes some way towards representing the range of regional climate changes that would arise in a set of different coupled ocean-atmosphere GCMs. This approach will not capture the full range of uncertainty affecting regional climate changes over land, because it still relies on one atmosphere model and one land surface scheme, so responses to radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions will still be constrained by the behaviour of that single model. Nevertheless, we consider that our experimental design avoids the reliance on one single realization of climate and hence allows some of the uncertainties in regional climate-change impacts to be illustrated and explored.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n2 = 2032. ACCESS1-0, 1 = 2026. ACCESS1-0, 2 = 2040", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed11.pdf" - }, - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nClimate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting di GLYPH<11> erent aspects of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n13 of 22\nissues and re-constructing them di GLYPH<11> erently. By comparing the persistent words used related to the two discourses in the 10-year period in Table 2, we think that global warming showed a relative preference toward general descriptions or slogans, such as 'earth' and 'pollution', whereas 'climate change' was more associated to specific issues like 'solar', 'coal', 'china', and 'food'.\nStudies have suggested that the public shows a preference for scientific publications with general keywords compared with those with complicated scientific jargon [47], lacking a deep understanding of the complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions seem to suit global warming more than climate change according to the current study, which is probably because climate change receives more publicity and recognition than global warming in the scientific community. In the association network shown in Figure 2, global warming was found to be more connected with temperature abnormalities. This finding is in accordance with studies reporting that short-term temperature anomalies [87] can increase the public's belief about global warming by increasing the understanding of this abstract issue [88], although scientists mostly make judgments based on long-term weather statistics [89]. However, none of the four words, 'snow', 'summer', 'winter', or 'heatwave' in the temperature theme of global warming were ranked in the top 50 nodes list of the climate change network.", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "Discussion and conclusion\nMeanwhile, the risk of price /fluctuations caused by global corn trade due to future climate change should be paid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, the population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, the supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify the contradiction between supply and demand, which would threaten the food security and sustainable development in the whole world.\nIn this study, 5 climate models are selected, which are recommended by ISI-MIP (/T_he Inter-Sectoral Impact Model Intercomparison Project); compared with other climate models, the /five models could more e/ffectively support impact assessment in di/fferent sectors and provide more reliable results. Based on the simulation results\nͷͷ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/\nfrom 5 climate models under 4 RCP scenarios, the future climate situations were selected which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C at the end of 21 century relative to pre-industrial levels; it could minimize the uncertainties of future climate data. /T_he inputs for DSSAT simulation include soil parameters, crop calendar data and management information are coped with carefully to improve the e/ffectiveness and reliability of maize yield simulation.", - "page_start": 10, - "page_end": 11, - "source_file": "pubmed9.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "60KM GLOBAL PROJECTIONS\n20 plausible climate futures. Latest Hadley Centre climate model. Simulations of extreme weather. Simultaneous impacts captured at multiple locations.\nThis resolution will enable more realistic simulations of climate for the UK and capture the drivers of extreme weather, a significant advance on the 300 km-resolution simulations of UKCP09. A set of 20 plausible global projections of 21st century climate will be generated using an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These projections will be selected to represent a wide range of possible future climate states to reflect key uncertainties, informing a risk-based approach to planning. They will be generated to provide spatially coherent daily data at a horizontal resolution of 60 km for two greenhouse gas concentration scenarios. These will be compared with an ensemble of CMIP5 models to provide additional information on uncertainties in the projections relative to other climate models.", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nKuo Li ͷ * , Jie Pan ͷ , Wei Xiong ͸ , Wei Xie ͹ & Tariq Ali ͹\nClimate change is becoming more and more remarkable which has an obvious impact on crop yields all over the world. Future climate scenario data was simulated by ͻ climate models recommended by ISI-MIP under ͺ RCP scenarios, in which the approximate scenarios with global warming by ͷ.ͻ °C and ͸ °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the world under global warming by ͷ.ͻ °C and ͸.Ͷ °C were analyzed and the market prices of maize at national and global levels were simulated. The results showed that, the risk of maize yield reduction under ͸.Ͷ °C scenario was much more serious than ͷ.ͻ °C scenario; the ratios of yield changes were separately Ͷ.ͷ;% and - ͷͶ.;% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. The reduction trend of total maize production is obvious in the top five countries and the main producing regions of the world, especially under the ͸.Ͷ °C scenario. The market price of maize would increase by around Ͷ.ͽ% and ͹.ͺ% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. With the quickly increasing population in the world, it is urgent for all countries to pay enough attention to the risk of maize yield and take actions of mitigation and adaptation to climate change.\nIn the past hundred years, the global climate has experienced great changes 1-4 . According to the sixth assessment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and almost all regions in the world experienced surface warming 5 . Due to global warming, the extreme climate events become more and more frequent, and the ecological environment problems caused by climate change are more and more serious, which restrict the sustainable development of human society and health 6-10 . Global warming has gradually changed from a scienti/fic issue to a major social issue of common concern to governments and people of all countries 11-13 . In 2016, nearly 200 parties of the United Nations Framework Convention on climate change reached the Paris Agreement at the climate change conference in Paris 14 . Paris Agreement has indicated and pursue e/fforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "Which of #climatechange and #globalwarming is the most used ?", - "target_page": 5, - "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nco2. 9, #Globalwarming.Centrality = 0.244. 10, #Climatechange.Hashtag = parisagreement *. 10, #Climatechange.Centrality = 0.232. 10, #Globalwarming.Hashtag = green. 10, #Globalwarming.Centrality = 0.239. 11, #Climatechange.Hashtag = actonclimate *. 11, #Climatechange.Centrality = 0.225. 11, #Globalwarming.Hashtag = tcot *. 11, #Globalwarming.Centrality = 0.229. 12, #Climatechange.Hashtag = water. 12, #Climatechange.Centrality = 0.221. 12, #Globalwarming.Hashtag = nature. 12, #Globalwarming.Centrality = 0.213. 13, #Climatechange.Hashtag = pollution. 13, #Climatechange.Centrality = 0.210. 13, #Globalwarming.Hashtag = news. 13, #Globalwarming.Centrality = 0.198. 14, #Climatechange.Hashtag = earth. 14, #Climatechange.Centrality = 0.207. 14, #Globalwarming.Hashtag = energy. 14, #Globalwarming.Centrality = 0.192. 15, #Climatechange.Hashtag = green. 15, #Climatechange.Centrality = 0.200. 15, #Globalwarming.Hashtag = climatechangeisreal. 15, #Globalwarming.Centrality = 0.187. 16, #Climatechange.Hashtag = climatechangeisreal. 16, #Climatechange.Centrality = 0.195. 16, #Globalwarming.Hashtag = obama. 16, #Globalwarming.Centrality = 0.181. 17, #Climatechange.Hashtag = renewableenergy *. 17, #Climatechange.Centrality = 0.194. 17, #Globalwarming.Hashtag = climateaction. 17, #Globalwarming.Centrality = 0.175. 18, #Climatechange.Hashtag =", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. Cont.\n23, #Climatechange.Hashtag = co2. 23, #Climatechange.Centrality = 0.174. 23, #Globalwarming.Hashtag = snow. 23, #Globalwarming.Centrality = 0.161. 24, #Climatechange.Hashtag = weather. 24, #Climatechange.Centrality = 0.169. 24, #Globalwarming.Hashtag = world. 24, #Globalwarming.Centrality = 0.157. 25, #Climatechange.Hashtag = solar. 25, #Climatechange.Centrality = 0.165. 25, #Globalwarming.Hashtag = gop *. 25, #Globalwarming.Centrality = 0.156. 26, #Climatechange.Hashtag = economy. 26, #Climatechange.Centrality = 0.164. 26, #Globalwarming.Hashtag = arctic. 26, #Globalwarming.Centrality = 0.150. 27, #Climatechange.Hashtag = auspol. 27, #Climatechange.Centrality = 0.163 *. 27, #Globalwarming.Hashtag = winter. 27, #Globalwarming.Centrality = 0.145. 28, #Climatechange.Hashtag = education. 28, #Climatechange.Centrality = 0.155. 28, #Globalwarming.Hashtag = p2 *. 28, #Globalwarming.Centrality = 0.144. 29, #Climatechange.Hashtag = news. 29, #Climatechange.Centrality = 0.152. 29, #Globalwarming.Hashtag = drought. 29, #Globalwarming.Centrality = 0.142. 30, #Climatechange.Hashtag = drought. 30, #Climatechange.Centrality = 0.150. 30, #Globalwarming.Hashtag = epa *. 30, #Globalwarming.Centrality = 0.141. 31, #Climatechange.Hashtag = coal. 31, #Climatechange.Centrality = 0.147. 31, #Globalwarming.Hashtag = global. 31, #Globalwarming.Centrality = 0.137. 32, #Climatechange.Hashtag = sustainable. 32, #Climatechange.Centrality =", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\n1, #Climatechange.Hashtag = climate. 1, #Climatechange.Centrality = 0.466. 1, #Globalwarming.Hashtag = climate. 1, #Globalwarming.Centrality = 0.530. 2, #Climatechange.Hashtag = environment. 2, #Climatechange.Centrality = 0.465. 2, #Globalwarming.Hashtag = environment. 2, #Globalwarming.Centrality = 0.446. 3, #Climatechange.Hashtag = climateaction. 3, #Climatechange.Centrality = 0.391. 3, #Globalwarming.Hashtag = science. 3, #Globalwarming.Centrality = 0.319. 4, #Climatechange.Hashtag = sustainability. 4, #Climatechange.Centrality = 0.316. 4, #Globalwarming.Hashtag = earth. 4, #Globalwarming.Centrality = 0.296. 5, #Climatechange.Hashtag = science. 5, #Climatechange.Centrality = 0.314. 5, #Globalwarming.Hashtag = weather. 5, #Globalwarming.Centrality = 0.280. 6, #Climatechange.Hashtag = energy. 6, #Climatechange.Centrality = 0.283. 6, #Globalwarming.Hashtag = us *. 6, #Globalwarming.Centrality = 0.280. 7, #Climatechange.Hashtag = trump. 7, #Climatechange.Centrality = 0.257. 7, #Globalwarming.Hashtag = trump. 7, #Globalwarming.Centrality = 0.263. 8, #Climatechange.Hashtag = us *. 8, #Climatechange.Centrality = 0.247. 8, #Globalwarming.Hashtag = pollution. 8, #Globalwarming.Centrality = 0.256. 9, #Climatechange.Hashtag = cop21 *. 9, #Climatechange.Centrality = 0.232. 9, #Globalwarming.Hashtag =", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nhealth. 18, #Climatechange.Centrality = 0.193. 18, #Globalwarming.Hashtag = algore *. 18, #Globalwarming.Centrality = 0.174. 19, #Climatechange.Hashtag = nature. 19, #Climatechange.Centrality = 0.187. 19, #Globalwarming.Hashtag = water. 19, #Globalwarming.Centrality = 0.171. 20, #Climatechange.Hashtag = renewables. 20, #Climatechange.Centrality = 0.186. 20, #Globalwarming.Hashtag = agw *. 20, #Globalwarming.Centrality = 0.164. 21, #Climatechange.Hashtag = cleanenergy. 21, #Climatechange.Centrality = 0.176. 21, #Globalwarming.Hashtag = carbon. 21, #Globalwarming.Centrality = 0.164. 22, #Climatechange.Hashtag = carbon. 22, #Climatechange.Centrality = 0.175. 22, #Globalwarming.Hashtag = sustainability. 22, #Globalwarming.Centrality = 0.163", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. Cont.\n0.147. 32, #Globalwarming.Hashtag = eco. 32, #Globalwarming.Centrality = 0.137. 33, #Climatechange.Hashtag = cdnpoli. 33, #Climatechange.Centrality = 0.144 *. 33, #Globalwarming.Hashtag = actonclimate. 33, #Globalwarming.Centrality = 0.136. 34, #Climatechange.Hashtag = sdgs. 34, #Climatechange.Centrality = 0.143 *. 34, #Globalwarming.Hashtag = health. 34, #Globalwarming.Centrality = 0.134. 35, #Climatechange.Hashtag = china. 35, #Climatechange.Centrality = 0.143. 35, #Globalwarming.Hashtag = un *. 35, #Globalwarming.Centrality = 0.133. 36, #Climatechange.Hashtag = gop. 36, #Climatechange.Centrality = 0.143 *. 36, #Globalwarming.Hashtag = solar. 36, #Globalwarming.Centrality = 0.132. 37, #Climatechange.Hashtag = food. 37, #Climatechange.Centrality = 0.141. 37, #Globalwarming.Hashtag = economy. 37, #Globalwarming.Centrality = 0.131. 38, #Climatechange.Hashtag = un. 38, #Climatechange.Centrality = 0.141 *. 38, #Globalwarming.Hashtag = hoax. 38, #Globalwarming.Centrality = 0.131. 39, #Climatechange.Hashtag = cop24 *. 39, #Climatechange.Centrality = 0.140. 39, #Globalwarming.Hashtag = california. 39, #Globalwarming.Centrality = 0.130. 40, #Climatechange.Hashtag = agriculture. 40, #Climatechange.Centrality = 0.138. 40, #Globalwarming.Hashtag = politics. 40, #Globalwarming.Centrality = 0.129. 41, #Climatechange.Hashtag = environmental. 41, #Climatechange.Centrality = 0.136. 41, #Globalwarming.Hashtag = india. 41,", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. Cont.\n#Globalwarming.Centrality = 0.128. 42, #Climatechange.Hashtag = fossilfuels. 42, #Climatechange.Centrality = 0.134. 42, #Globalwarming.Hashtag = china. 42, #Globalwarming.Centrality = 0.127. 43, #Climatechange.Hashtag = arctic. 43, #Climatechange.Centrality = 0.134. 43, #Globalwarming.Hashtag = planet. 43, #Globalwarming.Centrality = 0.127. 44, #Climatechange.Hashtag = epa *. 44, #Climatechange.Centrality = 0.133. 44, #Globalwarming.Hashtag = parisagreement *. 44, #Globalwarming.Centrality = 0.126. 45, #Climatechange.Hashtag = biodiversity. 45, #Climatechange.Centrality = 0.132. 45, #Globalwarming.Hashtag = heatwave. 45, #Globalwarming.Centrality = 0.125. 46, #Climatechange.Hashtag = future. 46, #Climatechange.Centrality = 0.131. 46, #Globalwarming.Hashtag = summer. 46, #Globalwarming.Centrality = 0.121. 47, #Climatechange.Hashtag = canada. 47, #Climatechange.Centrality = 0.128. 47, #Globalwarming.Hashtag = nyc *. 47, #Globalwarming.Centrality = 0.118. 48, #Climatechange.Hashtag = emissions. 48, #Climatechange.Centrality = 0.128. 48, #Globalwarming.Hashtag = nasa. 48, #Globalwarming.Centrality = 0.118. 49, #Climatechange.Hashtag = obama. 49, #Climatechange.Centrality = 0.127. 49, #Globalwarming.Hashtag = future. 49, #Globalwarming.Centrality = 0.118. 50, #Climatechange.Hashtag = politics. 50, #Climatechange.Centrality = 0.125. 50, #Globalwarming.Hashtag = oil. 50, #Globalwarming.Centrality = 0.117", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nAs the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. As the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. As the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nAssociation networks surrounding #climatechange and #globalwarming showed di GLYPH<11> erent properties. The climate change discourse included 38,821 hashtags, whereas the global warming discourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the two discourses based on centrality. As some hashtags were used in the form of an abbreviation or phrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant words. Hashtags 'canada', 'cdnpoli', 'sdgs', 'biodiversity', 'education', 'environmental', 'cop24', 'sustainable', 'auspol', 'food', 'agriculture', 'cleanenergy', 'renewableenergy', 'renewables', 'emissions', 'coal', 'fossilfuels', and 'cop21' only showed up on the top 50 list of the 'climate change' network. Hashtags 'tcot', 'california', 'p2', 'nyc', 'snow', 'agw', 'summer', 'global', 'winter', 'india', 'planet', 'heatwave', 'hoax', 'nasa', 'algore', 'world', 'oil', and 'eco' were unique on the top 50 list of the global warming network. The two lists only shared three out of the top five hashtags. In the #climatechange network, 'climateaction' was ranked third place and 'sustainability' was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network. In the #globalwarming network, 'earth' and 'weather' were among the top five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nof the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "Is the #climateaction hashtag more bound the #globalwarming of #climatechange ?", - "target_page": 7, - "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\n1, #Climatechange.Hashtag = climate. 1, #Climatechange.Centrality = 0.466. 1, #Globalwarming.Hashtag = climate. 1, #Globalwarming.Centrality = 0.530. 2, #Climatechange.Hashtag = environment. 2, #Climatechange.Centrality = 0.465. 2, #Globalwarming.Hashtag = environment. 2, #Globalwarming.Centrality = 0.446. 3, #Climatechange.Hashtag = climateaction. 3, #Climatechange.Centrality = 0.391. 3, #Globalwarming.Hashtag = science. 3, #Globalwarming.Centrality = 0.319. 4, #Climatechange.Hashtag = sustainability. 4, #Climatechange.Centrality = 0.316. 4, #Globalwarming.Hashtag = earth. 4, #Globalwarming.Centrality = 0.296. 5, #Climatechange.Hashtag = science. 5, #Climatechange.Centrality = 0.314. 5, #Globalwarming.Hashtag = weather. 5, #Globalwarming.Centrality = 0.280. 6, #Climatechange.Hashtag = energy. 6, #Climatechange.Centrality = 0.283. 6, #Globalwarming.Hashtag = us *. 6, #Globalwarming.Centrality = 0.280. 7, #Climatechange.Hashtag = trump. 7, #Climatechange.Centrality = 0.257. 7, #Globalwarming.Hashtag = trump. 7, #Globalwarming.Centrality = 0.263. 8, #Climatechange.Hashtag = us *. 8, #Climatechange.Centrality = 0.247. 8, #Globalwarming.Hashtag = pollution. 8, #Globalwarming.Centrality = 0.256. 9, #Climatechange.Hashtag = cop21 *. 9, #Climatechange.Centrality = 0.232. 9, #Globalwarming.Hashtag =", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nco2. 9, #Globalwarming.Centrality = 0.244. 10, #Climatechange.Hashtag = parisagreement *. 10, #Climatechange.Centrality = 0.232. 10, #Globalwarming.Hashtag = green. 10, #Globalwarming.Centrality = 0.239. 11, #Climatechange.Hashtag = actonclimate *. 11, #Climatechange.Centrality = 0.225. 11, #Globalwarming.Hashtag = tcot *. 11, #Globalwarming.Centrality = 0.229. 12, #Climatechange.Hashtag = water. 12, #Climatechange.Centrality = 0.221. 12, #Globalwarming.Hashtag = nature. 12, #Globalwarming.Centrality = 0.213. 13, #Climatechange.Hashtag = pollution. 13, #Climatechange.Centrality = 0.210. 13, #Globalwarming.Hashtag = news. 13, #Globalwarming.Centrality = 0.198. 14, #Climatechange.Hashtag = earth. 14, #Climatechange.Centrality = 0.207. 14, #Globalwarming.Hashtag = energy. 14, #Globalwarming.Centrality = 0.192. 15, #Climatechange.Hashtag = green. 15, #Climatechange.Centrality = 0.200. 15, #Globalwarming.Hashtag = climatechangeisreal. 15, #Globalwarming.Centrality = 0.187. 16, #Climatechange.Hashtag = climatechangeisreal. 16, #Climatechange.Centrality = 0.195. 16, #Globalwarming.Hashtag = obama. 16, #Globalwarming.Centrality = 0.181. 17, #Climatechange.Hashtag = renewableenergy *. 17, #Climatechange.Centrality = 0.194. 17, #Globalwarming.Hashtag = climateaction. 17, #Globalwarming.Centrality = 0.175. 18, #Climatechange.Hashtag =", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. Cont.\n23, #Climatechange.Hashtag = co2. 23, #Climatechange.Centrality = 0.174. 23, #Globalwarming.Hashtag = snow. 23, #Globalwarming.Centrality = 0.161. 24, #Climatechange.Hashtag = weather. 24, #Climatechange.Centrality = 0.169. 24, #Globalwarming.Hashtag = world. 24, #Globalwarming.Centrality = 0.157. 25, #Climatechange.Hashtag = solar. 25, #Climatechange.Centrality = 0.165. 25, #Globalwarming.Hashtag = gop *. 25, #Globalwarming.Centrality = 0.156. 26, #Climatechange.Hashtag = economy. 26, #Climatechange.Centrality = 0.164. 26, #Globalwarming.Hashtag = arctic. 26, #Globalwarming.Centrality = 0.150. 27, #Climatechange.Hashtag = auspol. 27, #Climatechange.Centrality = 0.163 *. 27, #Globalwarming.Hashtag = winter. 27, #Globalwarming.Centrality = 0.145. 28, #Climatechange.Hashtag = education. 28, #Climatechange.Centrality = 0.155. 28, #Globalwarming.Hashtag = p2 *. 28, #Globalwarming.Centrality = 0.144. 29, #Climatechange.Hashtag = news. 29, #Climatechange.Centrality = 0.152. 29, #Globalwarming.Hashtag = drought. 29, #Globalwarming.Centrality = 0.142. 30, #Climatechange.Hashtag = drought. 30, #Climatechange.Centrality = 0.150. 30, #Globalwarming.Hashtag = epa *. 30, #Globalwarming.Centrality = 0.141. 31, #Climatechange.Hashtag = coal. 31, #Climatechange.Centrality = 0.147. 31, #Globalwarming.Hashtag = global. 31, #Globalwarming.Centrality = 0.137. 32, #Climatechange.Hashtag = sustainable. 32, #Climatechange.Centrality =", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nhealth. 18, #Climatechange.Centrality = 0.193. 18, #Globalwarming.Hashtag = algore *. 18, #Globalwarming.Centrality = 0.174. 19, #Climatechange.Hashtag = nature. 19, #Climatechange.Centrality = 0.187. 19, #Globalwarming.Hashtag = water. 19, #Globalwarming.Centrality = 0.171. 20, #Climatechange.Hashtag = renewables. 20, #Climatechange.Centrality = 0.186. 20, #Globalwarming.Hashtag = agw *. 20, #Globalwarming.Centrality = 0.164. 21, #Climatechange.Hashtag = cleanenergy. 21, #Climatechange.Centrality = 0.176. 21, #Globalwarming.Hashtag = carbon. 21, #Globalwarming.Centrality = 0.164. 22, #Climatechange.Hashtag = carbon. 22, #Climatechange.Centrality = 0.175. 22, #Globalwarming.Hashtag = sustainability. 22, #Globalwarming.Centrality = 0.163", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. Cont.\n0.147. 32, #Globalwarming.Hashtag = eco. 32, #Globalwarming.Centrality = 0.137. 33, #Climatechange.Hashtag = cdnpoli. 33, #Climatechange.Centrality = 0.144 *. 33, #Globalwarming.Hashtag = actonclimate. 33, #Globalwarming.Centrality = 0.136. 34, #Climatechange.Hashtag = sdgs. 34, #Climatechange.Centrality = 0.143 *. 34, #Globalwarming.Hashtag = health. 34, #Globalwarming.Centrality = 0.134. 35, #Climatechange.Hashtag = china. 35, #Climatechange.Centrality = 0.143. 35, #Globalwarming.Hashtag = un *. 35, #Globalwarming.Centrality = 0.133. 36, #Climatechange.Hashtag = gop. 36, #Climatechange.Centrality = 0.143 *. 36, #Globalwarming.Hashtag = solar. 36, #Globalwarming.Centrality = 0.132. 37, #Climatechange.Hashtag = food. 37, #Climatechange.Centrality = 0.141. 37, #Globalwarming.Hashtag = economy. 37, #Globalwarming.Centrality = 0.131. 38, #Climatechange.Hashtag = un. 38, #Climatechange.Centrality = 0.141 *. 38, #Globalwarming.Hashtag = hoax. 38, #Globalwarming.Centrality = 0.131. 39, #Climatechange.Hashtag = cop24 *. 39, #Climatechange.Centrality = 0.140. 39, #Globalwarming.Hashtag = california. 39, #Globalwarming.Centrality = 0.130. 40, #Climatechange.Hashtag = agriculture. 40, #Climatechange.Centrality = 0.138. 40, #Globalwarming.Hashtag = politics. 40, #Globalwarming.Centrality = 0.129. 41, #Climatechange.Hashtag = environmental. 41, #Climatechange.Centrality = 0.136. 41, #Globalwarming.Hashtag = india. 41,", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nTable 1. Cont.\n#Globalwarming.Centrality = 0.128. 42, #Climatechange.Hashtag = fossilfuels. 42, #Climatechange.Centrality = 0.134. 42, #Globalwarming.Hashtag = china. 42, #Globalwarming.Centrality = 0.127. 43, #Climatechange.Hashtag = arctic. 43, #Climatechange.Centrality = 0.134. 43, #Globalwarming.Hashtag = planet. 43, #Globalwarming.Centrality = 0.127. 44, #Climatechange.Hashtag = epa *. 44, #Climatechange.Centrality = 0.133. 44, #Globalwarming.Hashtag = parisagreement *. 44, #Globalwarming.Centrality = 0.126. 45, #Climatechange.Hashtag = biodiversity. 45, #Climatechange.Centrality = 0.132. 45, #Globalwarming.Hashtag = heatwave. 45, #Globalwarming.Centrality = 0.125. 46, #Climatechange.Hashtag = future. 46, #Climatechange.Centrality = 0.131. 46, #Globalwarming.Hashtag = summer. 46, #Globalwarming.Centrality = 0.121. 47, #Climatechange.Hashtag = canada. 47, #Climatechange.Centrality = 0.128. 47, #Globalwarming.Hashtag = nyc *. 47, #Globalwarming.Centrality = 0.118. 48, #Climatechange.Hashtag = emissions. 48, #Climatechange.Centrality = 0.128. 48, #Globalwarming.Hashtag = nasa. 48, #Globalwarming.Centrality = 0.118. 49, #Climatechange.Hashtag = obama. 49, #Climatechange.Centrality = 0.127. 49, #Globalwarming.Hashtag = future. 49, #Globalwarming.Centrality = 0.118. 50, #Climatechange.Hashtag = politics. 50, #Climatechange.Centrality = 0.125. 50, #Globalwarming.Hashtag = oil. 50, #Globalwarming.Centrality = 0.117", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nAs the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. As the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. As the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nAssociation networks surrounding #climatechange and #globalwarming showed di GLYPH<11> erent properties. The climate change discourse included 38,821 hashtags, whereas the global warming discourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the two discourses based on centrality. As some hashtags were used in the form of an abbreviation or phrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant words. Hashtags 'canada', 'cdnpoli', 'sdgs', 'biodiversity', 'education', 'environmental', 'cop24', 'sustainable', 'auspol', 'food', 'agriculture', 'cleanenergy', 'renewableenergy', 'renewables', 'emissions', 'coal', 'fossilfuels', and 'cop21' only showed up on the top 50 list of the 'climate change' network. Hashtags 'tcot', 'california', 'p2', 'nyc', 'snow', 'agw', 'summer', 'global', 'winter', 'india', 'planet', 'heatwave', 'hoax', 'nasa', 'algore', 'world', 'oil', and 'eco' were unique on the top 50 list of the global warming network. The two lists only shared three out of the top five hashtags. In the #climatechange network, 'climateaction' was ranked third place and 'sustainability' was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network. In the #globalwarming network, 'earth' and 'weather' were among the top five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.2. Association Network Analysis\nThe association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes are labelled with the hashtags and the undirected edges are weighted to reflect the frequency of co-occurrence. The modularity analysis identified four clusters in the #climatechange network and five in the #globalwarming network, where clusters are di GLYPH<11> erentiated by color (resolution is 0.75 for climate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each cluster are also summarized and represented in the network depicted in Figure 2.\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer to general facts about global climate issues, sharing words about the causes or e GLYPH<11> ects concerning sustainability. The di GLYPH<11> erence is that the largest cluster of #globalwarming (46% of the network) includes more slogan words, such as 'world', 'planet', 'global', and 'climatechangeisreal', whereas the largest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as agriculture, biodiversity, education, and politics.\nFor the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses on the responsibility to tackle climate change, where several global action hashtags are included, such as 'un', 'parisagreement', 'cop21', and 'cop24'. The theme of the third largest cluster (20%) in the climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the central part of the network with a mixed theme composed of three highly ranked hashtags, including 'environment' (No. 2), 'climateaction' (No. 3), and 'energy' (No. 6).\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062 Int. J. Environ. Res. Public Health 2020 , xx , 5\n9 of 22 9 of 22\nFigure 2. Association network of climate change discourse (a) , and ( b ) association network of global warming discourse (b) . Figure 2. Association network of climate change discourse ( a ), and ( b ) association network of global warming discourse ( b ).\n(", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "What are two main reasons for one's low climate concern ?", - "target_page": 13, - "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nEven when climate change and global warming shared concern about similar topics such as the cause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas climate change preferred a more in-depth perspective, highlighting the importance of global action to mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to carbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern [90], the two terminologies' di GLYPH<11> erences in connotations suggest that introducing these absent sub-topics into global warming discourse or highlighting climate change for its inherent connotations may help communicators raise public concern about climate.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nClimate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting di GLYPH<11> erent aspects of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n13 of 22\nissues and re-constructing them di GLYPH<11> erently. By comparing the persistent words used related to the two discourses in the 10-year period in Table 2, we think that global warming showed a relative preference toward general descriptions or slogans, such as 'earth' and 'pollution', whereas 'climate change' was more associated to specific issues like 'solar', 'coal', 'china', and 'food'.\nStudies have suggested that the public shows a preference for scientific publications with general keywords compared with those with complicated scientific jargon [47], lacking a deep understanding of the complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions seem to suit global warming more than climate change according to the current study, which is probably because climate change receives more publicity and recognition than global warming in the scientific community. In the association network shown in Figure 2, global warming was found to be more connected with temperature abnormalities. This finding is in accordance with studies reporting that short-term temperature anomalies [87] can increase the public's belief about global warming by increasing the understanding of this abstract issue [88], although scientists mostly make judgments based on long-term weather statistics [89]. However, none of the four words, 'snow', 'summer', 'winter', or 'heatwave' in the temperature theme of global warming were ranked in the top 50 nodes list of the climate change network.", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "1. Introduction\nThe public's distinct understanding of the cause and e GLYPH<11> ect of the global climate issue is an obstacle to joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], previous studies noticed that the public had even failed to reach an agreement on whether 'climate change' or 'global warming' is the most appropriate definition of the global climate concern [3-5]. According to the definition provided by [6], global warming describes global climate issues as a continuous increase in the average temperature of Earth's surface due to anthropogenic emissions of greenhouse gases, whereas climate change includes not only temperature rise but also a range of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062; doi:10.3390 / ijerph17031062\nwww.mdpi.com / journal / ijerph\n/gid00001\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n2 of 22\ncomplex changes in the state of the climate [7], which may be caused by natural process, external forces, or human interventions [8]. By randomly assigning respondents to climate change or global warming questionnaires, scholars confirmed that the di GLYPH<11> erent connotations contained in the two definitions are likely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which may inhibit collaboration and joint e GLYPH<11> orts to mitigate the global challenge.\nPublic preference between climate change and global warming is even more apparent when considering the ideology spectrum [10]. Some scholars concluded that conservatives, who are less concerned with environmental issues, tended to use global warming as a narrative strategy because global warming has a more direct connection with temperature rise, making it easier to find contradictory cues such as freezing weather or heavy snowstorms to deny global climate change facts [11]. The associations between global warming and human activities may contribute to more controversies as well [12], connecting global warming more with the 'hoax' frame [5] and evoking greater negative sentiment [13].", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher than any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. The implication of such HCVI values is that climate change at 2°C is projected to cause levels of vulnerability to food insecurity that are greater than any seen in the present day. For individual ensemble members, the number of countries with 'unprecedented' HCVI values at 2°C varies from three to seven. Conversely, many countries in the baseline climate have levels of vulnerability to food insecurity that are greater than those expected in other countries under 2°C global warming. This suggests that other factors are already posing greater risk for food insecurity than 2°C climate change is expected to cause in other countries, so the increased risk from climate change should not overshadow the need to reduce vulnerability to food insecurity arising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by addressing various socio-economic issues in such counties.\nThe JULES simulations show a general tendency towards increased run-off over approximately half of the land surface (figure 9) and the majority of the major river basins assessed (figure 10), but with large regional uncertainties including the possibility of decreased flows in many basins. The ensemble-mean change in mean streamflow shows an increase of between 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing an increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and southcentral USA, which see less than a 5% change in run-off, and the already very dry region of the Sahara Desert where the existing very small run-off become even smaller.\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with the regions seeing an increase in mean run-off seeing a larger percentage increase in low run-off-over 75% increases over much of North America, Eastern Europe and Asia. Note that this does not necessarily imply a larger increase in absolute low flow compared to absolute mean flow, because the baseline is (by definition) smaller for low flows. In western Europe, where the changes in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5\nGFDL-ESM2M\n14", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "4.2. Association Network Analysis\nb\n)\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n10 of 22\nIn the global warming network, politics was the second-largest discourse cluster (20% of the network), where 'tcot', short for 'Top Conservatives on Twitter', was the node ranked highest, and 'p2', short for 'Progressives 2.0', is also included. Several political figures, such as Obama and Al Gore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster (16%), including both domestic e GLYPH<11> orts, such as 'us', 'trump', 'climatechangeisreal', 'climateaction', and 'epa', and two international items, like 'china' and 'india'. The fourth cluster (in blue) referred to emissions, including hashtags like 'co2', 'green', and 'carbon'. The smallest cluster (8%) was composed of 'snow', 'winter', 'heatwave', and 'summer', referring to the temperature abnormalities on the earth.", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "Author for correspondence:\nModel Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration scenario. To provide more detailed representations of climate processes and impacts, the spatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution than the CMIP5 models. We used a set of impacts-relevant indices and a global land surface model to examine the projected changes in weather extremes and their implications for freshwater availability and vulnerability to food insecurity. Uncertainties in regional climate responses are assessed, examining ranges of outcomes in impacts to inform risk assessments. Despite some degree of inconsistency between components of the study due to the need to correct for systematic biases in some aspects, the outcomes from different ensemble members could be compared for several different indicators. The projections for weather extremes indices and biophysical impacts quantities support expectations that the magnitude of change is generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with increases being more intense than seen in CMIP5 projections. Precipitation-related extremes show more geographical variation with some increases and some decreases in both heavy precipitation and drought. There are substantial regional uncertainties in hydrological impacts at local scales due to different climate models producing different outcomes. Nevertheless, hydrological impacts generally point towards wetter conditions on average, with increased mean river flows, longer heavy rainfall events, particularly in South and East Asia with the most extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global warming. Some areas are projected to experience shorter meteorological drought events and less severe low flows, although longer droughts and/or decreases in low flows are projected in many other areas, particularly southern Africa and South America. Flows in the Amazon are projected to decline by up to 25%. Increases in either heavy rainfall or drought events imply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this vulnerability is projected to remain smaller than at 2°C global warming in approximately 76% of developing countries. At 2°C, four countries are projected to reach unprecedented levels of vulnerability to food insecurity.\nThis article is part of the theme issue 'The Paris Agreement: understanding the physical and social challenges for a warming world of 1.5°C above pre-industrial levels'.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "#Climatechange vs. #Globalwarming: Characterizing Two Competing Climate Discourses on Twitter with Semantic Network and Temporal Analyses\nAbstract: Distinct perceptions of the global climate is one of the factors preventing society from achieving consensus or taking collaborative actions on this issue. The public has not even reached an agreement on the naming of the global concern, showing preference for either 'climate change' or 'global warming', and few previous studies have addressed these two competing discourses resulting from distinct climate concerns by di GLYPH<11> erently linking numerous climate concepts. Based on the 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 and 31 December 2018, we constructed the semantic networks of the two discourses and examined their evolution over the decade. The findings indicate that climate change demonstrated a more scientific perspective and showed an attempt to condense climate discussions rather than di GLYPH<11> use the topic by frequently addressing sub-topics simultaneously. Global warming triggered more political responses and showed a greater connection with phenomena. Temporal analysis suggests that traditional political discussions were gradually fading in both discourses but more recently started to revive in the form of discourse alliance in the climate change discourse. The associations between global warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is becoming more dominant than global warming in public discussions. Although two discourses have shown more similarities in the rank order of important climate concepts, apparent disagreements continue about how these concepts are associated. These findings lay the groundwork for researchers and communicators to narrow the discrepancy between diverse climate perceptions.\nKeywords: climate change; global warming; semantic network analysis; temporal analysis; public discourse; Twitter", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "4.1. General Descriptions\nAssociation networks surrounding #climatechange and #globalwarming showed di GLYPH<11> erent properties. The climate change discourse included 38,821 hashtags, whereas the global warming discourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the two discourses based on centrality. As some hashtags were used in the form of an abbreviation or phrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant words. Hashtags 'canada', 'cdnpoli', 'sdgs', 'biodiversity', 'education', 'environmental', 'cop24', 'sustainable', 'auspol', 'food', 'agriculture', 'cleanenergy', 'renewableenergy', 'renewables', 'emissions', 'coal', 'fossilfuels', and 'cop21' only showed up on the top 50 list of the 'climate change' network. Hashtags 'tcot', 'california', 'p2', 'nyc', 'snow', 'agw', 'summer', 'global', 'winter', 'india', 'planet', 'heatwave', 'hoax', 'nasa', 'algore', 'world', 'oil', and 'eco' were unique on the top 50 list of the global warming network. The two lists only shared three out of the top five hashtags. In the #climatechange network, 'climateaction' was ranked third place and 'sustainability' was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network. In the #globalwarming network, 'earth' and 'weather' were among the top five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "1. BIODIVERSITY - THE NEED FOR URGENT ACTION\nDespite this urgent moral, economic and environmental imperative, nature is in a state of crisis . The five main direct drivers of biodiversity loss 9 - changes in land and sea use, overexploitation, climate change, pollution, and invasive alien species - are making nature disappear quickly. We see the changes in our everyday lives: concrete blocks rising up on green spaces, wilderness disappearing in front of our eyes, and more species being put at risk of extinction than at any point in human history. In the last four decades, global wildlife populations fell by 60% as a result of human activities 10 . And almost three quarters of the Earth's surface have been altered 11 , squeezing nature into an eversmaller corner of the planet.\nThe biodiversity crisis and the climate crisis are intrinsically linked. Climate change accelerates the destruction of the natural world through droughts, flooding and wildfires, while the loss and unsustainable use of nature are in turn key drivers of climate change. But just as the crises are linked, so are the solutions. Nature is a vital ally in the fight against climate change 12 . Nature regulates the climate, and nature-based solutions 13 , such as protecting and restoring wetlands, peatlands and coastal ecosystems, or sustainably managing marine areas, forests, grasslands and agricultural soils, will be essential for emission reduction and climate adaptation. Planting trees and deploying green infrastructure will help us to cool urban areas and mitigate the impact of natural disasters.\nBiodiversity loss and ecosystem collapse are one of the biggest threats facing humanity in the next decade 14 . They also threaten the foundations of our economy and the costs of inaction are high and are anticipated to increase 15 . The world lost an estimated €3.5-18.5 trillion per year in ecosystem services from 1997 to 2011 owing to land-cover change, and an estimated €5.5-10.5 trillion per year from land degradation. Specifically, biodiversity loss results in reduced crop yields and fish catches, increased economic losses from flooding and other disasters, and the loss of potential new sources of medicine 16 .\nThe EU is ready to show ambition to reverse biodiversity loss, lead the world by example and by action, and help agree and adopt a transformative post-2020 global framework at the 15 th Conference of the Parties to the Convention on Biological Diversity. This should\n6 World Economic Forum (2020), The Global Risks Report 2020.", - "page_start": 2, - "page_end": 2, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "How many scholarly articles are published every year ?", - "target_page": 1, - "target_passage": "over 3 million scholarly articles published per year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "3.1.1 Syntec (Retrieval)\nThe Syntec French collective bargaining agreement 3 comprises around 90 articles. Despite its topic, the language used does not feature the specificity of the legal vocabulary, making the data suitable for benchmarking general-purpose models. The articles have been scraped for use as documents. Four annotators were divided into two groups. Each group was given half of the articles and asked to choose an article and write a question about it. Each annotator wrote 25 questions. Thus, a hundred questions have been manually created and paired with the articles containing the answer 4 . Examples of the dataset are available in the appendix Figure 5. This dataset could also be used for text classification, clustering or topic modeling. Regarding quality checks, every article's integrity has been reviewed while manually creating questions. We also manually checked that the questions could only be answered using the annotated article.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv4.pdf" - }, - { - "text": "Publications\nThe Annual Report and the Sustainability Review are the major sources of printed information about Santos. Printed copies are available from the Share Registrar or Investor Relations.", - "page_start": 93, - "page_end": 93, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Researchers are mobile!\nFor example,\n30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE\nSource: Science Magazine\nResearch institutions and organizations therefore find it hard to\nBenchmark their organization against others\nIdentify, track, and report on researchers' a/ffiliations and contributions (publications, peer reviews, grants, and more)", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "Bibliography\nJago, Mark (2014). The Impossible: An Essay on Hyperintensionality . OUP Oxford. p. 41. ISBN 978-0-19-101915-9.\nJanssen, Theo M. V.; Zimmermann, Thomas Ede (2021). \"Montague Semantics\" (https://plat o.stanford.edu/entries/montague-semantics/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. pp. 3-4. Retrieved 10 March 2023.\nJohnson, Ralph H. (1999). \"The Relation Between Formal and Informal Logic\" (https://philpa pers.org/rec/JOHTRB-2). Argumentation . 13 (3): 265-274. doi:10.1023/A:1007789101256 (https://doi.org/10.1023%2FA%3A1007789101256). S2CID 141283158 (https://api.semantic scholar.org/CorpusID:141283158). Archived (https://web.archive.org/web/20211207184706/ https://philpapers.org/rec/JOHTRB-2) from the original on 7 December 2021. Retrieved 2 January 2022.\nJohnson, Ralph H. (15 July 2014). The Rise of Informal Logic: Essays on Argumentation, Critical Thinking, Reasoning and Politics . University of Windsor. ISBN 978-0-920233-71-9.\nKetland, Jeffrey (2005). \"Second Order Logic\". Macmillan Encyclopedia of Philosophy Volume 8 (https://www.encyclopedia.com/humanities/encyclopedias-almanacs-transcripts-a nd-maps/second-order-logic). Macmillan Reference USA. pp. 707-708. ISBN 978-0-02865788-2. Archived (https://web.archive.org/web/20211207184921/https://www.encyclopedi a.com/humanities/encyclopedias-almanacs-transcripts-and-maps/second-order-logic) from the original on 7 December 2021. Retrieved 4 January 2022.", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Bibliography\nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\". Philosophy Compass . 10 (5): 301-309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 6).\nRunco, Mark A.; Pritzker, Steven R. (1999). Encyclopedia of Creativity . Academic Press. p. 155. ISBN 978-0-12-227075-8.\nRush, Penelope (2014). \"Introduction\". The Metaphysics of Logic (https://philpapers.org/rec/ RUSTMO-4). Cambridge University Press. pp. 1-10. ISBN 978-1-107-03964-3. Archived (htt ps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the original on 7 December 2021. Retrieved 8 January 2022.\nSadegh-Zadeh, Kazem (2015). Handbook of Analytic Philosophy of Medicine . Springer. p. 983. ISBN 978-94-017-9579-1.\nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\". Teorema: Revista Internacional de Filosofía . 33 (2): 75-88. ISSN 0210-1602 (https://search.worldcat.org/issn/ 0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609).\nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022). Handbook of Logical Thought in India . Springer Nature. pp. 117-8. ISBN 978-81-322-2577-5.\nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic). Encyclopædia Britannica . Retrieved 23 September 2022.\nSchechter, Joshua. \"Epistemology of Logic - Bibliography\" (https://philpapers.org/browse/ep istemology-of-logic). PhilPapers . Retrieved 11 September 2022.", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia1.pdf" - }, - { - "text": "BASIC ENGLISH language skills\nBasic English Language Skills\nAll rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage or retrieval system, without prior permission in writing from the publisher. Subject to any applicable licensing terms and conditions in the case of electronically supplied publications, a person may engage in fair dealing with a copy of this publication for his or her personal or private use, or his or her research or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978.\nThe authors and the publisher have made every effort to obtain permission for and to acknowledge the use of copyright material. Should any infringement of copyright have occurred, please contact the publisher, and every effort will be made to rectify omissions or errors in the event of a reprint or new edition.\nDeveloped for Oxbridge Academy - 2015\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 1, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "PUBLICATIONS\nThe Annual Report is the main source of information for shareholders.", - "page_start": 67, - "page_end": 67, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Publisher ' s note\nAll claims expressed in this article are solely those of the authors and do not necessarily represent those of their af /uniFB01 liated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "For what reason a researcher's name is not a good tools to track back its works and affiliations ?", - "target_page": 1, - "target_passage": "Many people have the same name Names may change through marriage or other circumstances Individuals use different alphabets, abbreviations, or naming conventions People use different versions of their name during their career", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Query\nTable 6: Ratings provided by the LLM judge for the quality of human summaries translations of SummEvalFr from English to French.\n, Rating = 10.0. , # samples = 186. Good quality, Rating = 9.5. Good quality, # samples = 661. , Rating = 9.0. , # samples = 193. Not good enough, Rating = 8.5. Not good enough, # samples = 16. Not good enough, Rating = 8.0. Not good enough, # samples = 5. Not good enough, Rating = 7.5. Not good enough, # samples = 7. Not good enough, Rating = 7.0. Not good enough, # samples = 3. Not good enough, Rating = 6.0. Not good enough, # samples = 3. Not good enough, Rating = 5.0. Not good enough, # samples = 2. Not good enough, Rating = 4.0. Not good enough, # samples = 1. Not good enough, Rating = 3.0. Not good enough, # samples = 1. Not good enough, Rating = 2.0. Not good enough, # samples = 3. Not good enough, Rating = N/A. Not good enough, # samples = 19", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv4.pdf" - }, - { - "text": "Researchers are mobile!\nFor example,\n30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE\nSource: Science Magazine\nResearch institutions and organizations therefore find it hard to\nBenchmark their organization against others\nIdentify, track, and report on researchers' a/ffiliations and contributions (publications, peer reviews, grants, and more)", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "4.2 Using a Reasoner\nYou may notice that one or more of your classes is highlighted in red as in Figure 4.5. This is because we haven't run the reasoner yet so Protégé has not been able to verify that our new classes have no inconsistencies. When just creating classes and subclasses in a new ontology there is little chance of an inconsistency. However, it is a good idea to run the reasoner often. When there is an inconsistency the sooner it is discovered the easier it is to fix. One common mistake that new users make is to do a lot of development and then run the reasoner only to find that there are multiple inconsistencies which can make debugging significantly more difficult. So let's get into the good habit of running the reasoner often. Protégé comes with some reasoners bundled in and others available as plugins. Since we are going to write some SWRL rules later in the tutorial, we want to use the Pellet reasoner. It has the best support for SWRL at the time this tutorial is being written.", - "page_start": 15, - "page_end": 15, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "PRACTICAL AND PROFESSIONAL\nSomething of a paradox, too; highly competitive but approachable; stylish but never a slave to fashion. I have a true talent for leadership. I'm stable, steady, reliable, and efficient. At the same time, I'm good-looking, good-natured, and good-humored. Seek successful business person driven by values, with a 'whatever it takes' attitude - just like me, practical and professional.\nTHE\nHON COMPANY", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "7.4.4 On the way to better evidence - major data, research gaps and open questions\n· The quality of statistics and surveys fades the more irregular are the working conditions being studied. Which research methods are adequate for a clearer and more reliable evidence base on these working conditions? It might require research methods different from those used today, for example, more investigative case studies; it might also be helpful to evaluate the existing national working conditions surveys or statistics under this aspect.\n· Fading employer-employee relations. There are special research efforts necessary to study the application of OSH regulations of work with weak or no employer-employee relations, for example, for the self-employed and new forms of employment.\n· Surveys usually suffer a participation bias, for example, for the migrant workforce. The low participation rate of migrants can contribute to a particular underestimation regarding their often unfavourable working conditions.\n· Workers in manual occupations report better health than administrative workers but less expectations to do the job until being 60 years old . What are the reasons behind this? Is it the healthy worker effect, strong occupation-related differences regarding the perception of health and the expression of health problems? 502,503\n· High work intensity is a major cause for low wellbeing and high psychosocial risks. Survey data suggest that work intensification stopped after 2005 . What might be the reasons? Are the current indicators not specific enough to measure developments of work intensity? Has since then the major burden of intensification been put on other types of workers, for example, subcontracted or self-employed, temporary and seasonal workers, or on workers in the global supply chain?\n· How much evidence is there that dangerous work has been increasingly contracted out to small and medium-size enterprises and the self-employed ? Are there sufficiently detailed data on whether a larger share of service and client-related work at atypical times or work requiring long working hours has been taken over by self-employed or subcontractors?\n· The influence of enterprise size is often difficult to explain. In several aspects, the SMEs perform better, and in other important aspects worse. What might be the reason for this?\n· How is it possible to overcome the 'prevention gap' that in general exists between mobile and stationary workplaces? Can the solutions be technical or must there be organisational and legal measures, for example, a limitation of the prolonged use of ergonomically inadequate equipment like mobile phones?", - "page_start": 139, - "page_end": 139, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "WE WILL BE A GREAT PLACE TO WORK.\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active involvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that attracts and retains the most capable people who work safely, are motivated, and are devoted to making our company and our members successful.", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Justify:\nGive good reasons for some -thing", - "page_start": 40, - "page_end": 40, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Tackling Information Overload\nORCID is a non-profit organization, which provides a fully open and interoperable identifier to reliably connect researchers with their research contributions. The ORCID iD is a 16-digit identifier that researchers can register for and use for free.\nConnects individuals and their professional contributions across disciplines, organizations, and time\nEnables recognition of all types of research contributions and innovation\nHelps research institutions, funders, publishers, and other organizations better track and support research work", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "Installation tools\nPerform the installation by using the tools that are recommended and supported.", - "page_start": 106, - "page_end": 106, - "source_file": "sg248459.pdf" - }, - { - "text": "7.1 The need for a detailed OSH information base\nThe most recent EU Strategic Framework on Health and Safety at Work 2021-2027 puts the focus on changes, with the title 'Occupational safety and health in a changing world of work' . 434 It emphasises the value of science-based evidence by stating: 'Research and data collection, both at EU and national level, are a pre-condition for the prevention of work-related diseases and accidents. Scientific advice and the latest technological developments feed into OSH legislation and policy.'\nThese objectives show that good - and often more and better - evidence and monitoring tools are needed to understand all aspects of safety and health at work - as a pre-condition for priority setting and effective preventive actions. Consequently, in their national OSH strategies, a good number of Member States have agreed on provision of better data as a major target. 435\nOne example for such a monitoring exercise is EU-OSHA's series of foresight studies, for example, on emerging risks in the healthcare sector, including home and community care, emerging accident and electricity risks in renewable energy jobs, cost of work-related stress and psychosocial risks, and also shorter expert discussion papers, for example, on topics like nanotechnologies, robotics, 3D printing and use of performance-enhancing drugs in working life. 436", - "page_start": 130, - "page_end": 130, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "What is an ORCID iD ?", - "target_page": 1, - "target_passage": "ORCID iD is a 16-digit identifier that researchers can register for and use for free.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "Three Ways to Get Involved\n1. Encourage and support your researchers in getting, sharing, and using their ORCID iD\n2. Invest in integrating ORCID into your systems\n3. Connect data to and from your researchers' ORCID records to support information use and reuse across organizations\nSponsored by ORCID\nTo learn more go to https://orcid.org\nIDC #US44453318", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "Why Connect with ORCID?\nHundreds of members and systems use ORCID globally", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "5.5 MILLION+\nlive ORCID iDs registered since its 2012 launch\nSource: Orcid.org/statistics as of November 2018\nAll IDC research is ' 2018 by IDC. All rights reserved. All IDC materials are licensed with IDC's permission and in no way does the use or publication of IDC research indicate IDC's endorsement of ORCID's products/or strategies.\nNames may\nchange through\nmarriage or other\ncircumstances", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "An IDC Infographic, sponsored by ORCID | November 2018", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "Tackling Information Overload\nORCID is a non-profit organization, which provides a fully open and interoperable identifier to reliably connect researchers with their research contributions. The ORCID iD is a 16-digit identifier that researchers can register for and use for free.\nConnects individuals and their professional contributions across disciplines, organizations, and time\nEnables recognition of all types of research contributions and innovation\nHelps research institutions, funders, publishers, and other organizations better track and support research work", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "Application Group Identifier and the Application Group ID\nThe Application Group Identifier and the Application Group ID (AGID) are unique identifiers that are used by Content Manager OnDemand to identify the application group in system tables.", - "page_start": 127, - "page_end": 127, - "source_file": "sg246915.pdf" - }, - { - "text": "Host ID\nA host ID is a numeric identifier that is assigned to a group of host FC ports or internet Small Computer System Interface (iSCSI) host names for LUN mapping. For each host ID, SCSI IDs are mapped to volumes separately. The intent is to have a one-to-one relationship between hosts and host IDs, although this relationship cannot be policed.", - "page_start": 798, - "page_end": 798, - "source_file": "sg247938.pdf" - }, - { - "text": "Event ID\nAn event ID is a value that is used to identify a unique error condition that was detected by the Storwize V7000. An event ID is used internally in the cluster to identify the error.", - "page_start": 797, - "page_end": 797, - "source_file": "sg247938.pdf" - }, - { - "text": "How ORCID Works\nIt's a registry of unique persistent identifiers for researchers\nIt's a hub that connects researchers with their professional activities and contributions\nIt's a global community that enables researchers to share their data with other individuals, organizations, and systems", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "14.2.3 Adding a report ID\nThe next step is to define the reports to ODF. The report ID identifies the application group and application to which the report belongs. Figure 14-7 shows the window where you add the report ID.\nFigure 14-7 Adding a report ID\nTo create a report ID, specify the identifier and then choose the application group and application from the drop-down selection.\nUse the reference field to control when a report is available for distribution. The value that you enter in this field is used with a marked index column in the Content Manager OnDemand application group. When a reference value is available, the reference value is matched with the index value of the report. If a match exists, the report is made available for distribution. This tool is useful if several drafts of a report exist and you want to distribute only the final version.", - "page_start": 345, - "page_end": 346, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "What type of instability causes rims in ruptured polystyrene thin films to decay into small drops ?", - "target_page": 3, - "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "I. INTRODUCTION\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the process quantitatively in the early nineties. In these experiments, that proved to be a paradigm in our understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is deposited on a flat silicon oxide substrate is brought above the glass transition temperature. The film ruptures in several places, forming holes which subsequently grow, competing for space. As a result, a random polygonal network of liquid rims emerges. The rims may further decay into lines of small drops due to a Rayleigh-type instability [1-3]. The related problems of retracting contact lines on partially wetting substrates and the opening of single holes in rather thick films have also been studied [4, 5].\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple non-volatile liquids and polymers (for reviews see Refs. [6-8]). All stages of the dewetting of a film are studied: the initial film rupture via nucleation or a surface instability (called spinodal dewetting) [1, 9-13], the growth process of individual holes [14-16], the evolution of the resulting hole pattern [3, 13], and the stability of the individual dewetting fronts [17-19]. We note in passing, that descriptions of dewetting patterns may also be found in historic papers, particularly for the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] considered turpentine on water and Marangoni [21, p. 352f] oil on water.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" - }, - { - "text": "IV. CONCLUSION\nThe dynamical density functional theory describes the coupled dynamics of the density fields of the liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional hamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evaporating ultrathin film and also to investigate the influence of processes such as surface diffusion by the liquid, which are not incorporated in the KMC model. However, it is straightforward to extend the theory to consider a fully three-dimensional fluid film, in which one can distinguish between short- and long-range interactions of solvent and/or solute with the substrate. We have, however, restricted the examples given here to situations that can also be described using the KMC model. A further exploration will be presented elsewhere.\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It results from a long-wave approximation and consists of coupled evolution equations for the film thickness profile and the mean particle concentration. It has been used to discuss the self-pinning of receding contact lines that is related to the formation of rings of dried-in particles (coffeestain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the combined effects of convection and evaporation.\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques that allow one to produce hierarchically structured functional layers for a wide range of applications such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly towards increasingly complex systems. For example, there have been investigations of the influence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal particles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evaporating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of a secondary phase separation on evaporation-induced pattern formation in polymer films [102], and of the influence of an imposed flow on decomposition and deposition processes in a sliding ridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We acknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants MRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)].\n[1] G. Reiter, 'Dewetting of thin polymer films,' Phys. Rev. Lett. 68 , 75-78 (1992).\n[2] G. Reiter, 'Mobility of polymers in films thinner than their unperturbed size,' Europhys. Lett. 23 , 579-584 (1993).\n[3] A. Sharma and G. Reiter, 'Instability of thin polymer films on coated substrates: Rupture, dewetting and drop formation,' J. Colloid Interface Sci. 178 , 383-399 (1996).\n[4] P.-G. de Gennes, 'Wetting: Statics and dynamics,' Rev. Mod. Phys. 57 , 827-863 (1985).\n25", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\n[5] F. Brochard-Wyart and J. Daillant, 'Drying of solids wetted by thin liquid films,' Can. J. Phys. 68 , 1084-1088 (1989).\n[6] P. Muller-Buschbaum, 'Dewetting and pattern formation in thin polymer films as investigated in real and reciprocal space,' J. Phys.-Condes. Matter 15 , R1549-R1582 (2003).\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and K. Jacobs, 'Dynamics and structure formation in thin polymer melt films,' J. Phys.-Condes. Matter 17 , S267-S290 (2005).\n[8] U. Thiele, 'Structure formation in thin liquid films,' in S. Kalliadasis and U. Thiele, editors, 'Thin films of Soft Matter,' pages 25-93, Springer, Wien (2007).\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, 'Spinodal dewetting of thin polymer films,' Phys. Rev. Lett. 81 , 1251-1254 (1998).\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, 'Dewetting patterns and molecular forces: A reconciliation,' Phys. Rev. Lett. 86 , 5534-5537 (2001).\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, 'Dewetting: Film rupture by nucleation in the spinodal regime,' Phys. Rev. Lett. 87 , 016104 (2001).\n[12] M. Bestehorn and K. Neuffer, 'Surface patterns of laterally extended thin liquid films in three dimensions,' Phys. Rev. Lett. 87 , 046101 (2001).", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "A. Kinetic Monte Carlo model\nAquantitative analysis shows that the mean number of fingers depends only very weakly on the average concentration of the nanoparticles ρ av n ; only the mean finger width increases with increasing concentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles) leads to a much denser finger pattern and also causes the front instability to appear at an earlier stage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a smaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical potential (increasing its absolute value) has a similar but less strong effect. For details see [41]. These findings lead to the conclusion that the determining factor for the front instability is the ratio of the time-scales of the different transport processes. In particular, the front becomes more unstable when the velocity of the dewetting front increases as compared to the mean diffusion velocity of the nanoparticles.\nIf the particle diffusivity is low, the front 'collects' the particles, resulting in a build up of the particles at the front that itself is slowed down. This makes the front unstable and any fluctuation along the front will trigger a transverse instability that results in an evolving fingering pattern. This happens even when the particle-liquid and particle-particle attractive interactions do not favour clustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a purely dynamic effect and energetics plays no role in determining the number of fingers. We call this the 'transport regime'.", - "page_start": 11, - "page_end": 11, - "source_file": "1001.2669.pdf" - }, - { - "text": "I. INTRODUCTION\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such evaporatively receding contact lines may deposit very regular line or ring patterns parallel to the moving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating drop of colloidal suspension is well known as the 'coffee stain effect' [44]. Detailed investigations reveal the emergence of rich structures including multiple irregular rings, networks, regular droplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crystalline structures [22, 30, 45-49]. The deposition of regularly spaced straight lines orthogonal to the moving contact line has also been reported [50]. Droplet patterns may as well be created employing solvent-induced dewetting of glassy polymer layers below the glass transition temperature [51-53].\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and theoretically [55-58]. In this case, different contact line instabilities have been observed for evaporating liquid drops [59, 60].\nIn the present article we review and preview the experiments and in particular the various modelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting solvents. After reviewing the basic experimental results in Section II, we discuss in Section III several theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A, a dynamic density functional theory in Section III B, and a thin film evolution equation in Section III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the individual approaches and future challenges to all of them.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\n[59] C. Poulard, O. Benichou, and A. M. Cazabat, 'Freely receding evaporating droplets,' Langmuir 19 , 8828-8834 (2003).\n[60] Y. Gotkis, I. Ivanov, N. Murisic, and L. Kondic, 'Dynamic structure formation at the fronts of volatile liquid drops,' Phys. Rev. Lett. 97 , 186101 (2006).\n[61] E. Pauliac-Vaujour and P. Moriarty, 'Meniscus-mediated organization of colloidal nanoparticles,' J. Phys. Chem. C 111 , 16255-16260 (2007).\n[62] C. Gigault, K. Dalnoki-Veress, and J. R. Dutcher, 'Changes in the morphology of self-assembled polystyrene microsphere monolayers produced by annealing,' J. Colloid Interface Sci. 243 , 143-155 (2001).\n[63] A. Oron, S. H. Davis, and S. G. Bankoff, 'Long-scale evolution of thin liquid films,' Rev. Mod. Phys. 69 , 931-980 (1997).\n[64] U. Thiele, 'Thin film evolution equations from (evaporating) dewetting liquid layers to epitaxial growth,' J. Phys.-Cond. Mat. (2010), (at press).\n29", - "page_start": 28, - "page_end": 28, - "source_file": "1001.2669.pdf" - }, - { - "text": "IV. CONCLUSION\nWe have discussed recent work on pattern formation processes in films and drops of evaporating suspensions/solutions of polymers and particles. After reviewing experiments on suspensions of thiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and phase change processes involved. A theoretical approach to the modelling of the hydrodynamics on the mesoscale has been described as well as more microscopic models for the dynamics in the observed nanoscopic 'postcursor' film. In particular, we have introduced (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to investigate and understand the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor' film that remains behind the mesoscopic dewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n23\nscopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion within the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquidparticle and particle-particle interactions into account and therefore allows us to distinguish different regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport regime where the instability is almost completely independent of the interaction strengths and a demixing regime where particles and liquid demix at the receding front thereby increasing its transverse instability.", - "page_start": 22, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\n[41] I. Vancea, U. Thiele, E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, and P. J. Moriarty, 'Front instabilities in evaporatively dewetting nanofluids,' Phys. Rev. E 78 , 041601 (2008).\n[42] U. Thiele, Entnetzung von Kollagenfilmen , Ph.D. thesis, Technische Universitat Dresden (1998).\n[43] H. Yabu and M. Shimomura, 'Preparation of self-organized mesoscale polymer patterns on a solid substrate: Continuous pattern formation from a receding meniscus,' Adv. Funct. Mater. 15 , 575-581 (2005).\n[44] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, 'Capillary flow as the cause of ring stains from dried liquid drops,' Nature 389 , 827-829 (1997).\n[45] E. Adachi, A. S. Dimitrov, and K. Nagayama, 'Stripe patterns formed on a glass-surface during droplet evaporation,' Langmuir 11 , 1057-1060 (1995).\n[46] R. D. Deegan, 'Pattern formation in drying drops,' Phys. Rev. E 61 , 475-485 (2000).\n[47] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, 'Contact line deposits in an evaporating drop,' Phys. Rev. E 62 , 756-765 (2000).\n[48] L. Shmuylovich, A. Q. Shen, and H. A. Stone, 'Surface morphology of drying latex films: Multiple ring formation,' Langmuir 18 , 3441-3445 (2002).\n[49] V. X. Nguyen and K. J. Stebe, 'Patterning of small particles by a surfactant-enhanced Marangoni-\n28", - "page_start": 27, - "page_end": 27, - "source_file": "1001.2669.pdf" - }, - { - "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nWhen following the evolution of the branched patterns in situ (see the complementary video material of Ref. [40]), one clearly observes that different processes occur on different lenght scales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. The macroscopic front can be transversely unstable resulting in large-scale ( > 100 µ m) strongly anisotropic fingered structures. For fronts that move relatively quickly these macroscopic structures cover all the available substrate. However, when at a later stage the macroscopic front becomes slower, those fingers become scarce and 'macroscopic fingering' finally ceases. At this stage it is possible to appreciate that the seemingly dry region left behind by the front is not at all dry, but covered by an ultrathin 'postcursor' film that is itself unstable. The thickness of this film\n6\nis similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the ultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an unstable manner resulting in an array of isotropically branched structures as shown, e.g., above in Fig. 1. This indicates that at least some of the patterns described in the literature may have arisen from processes in similar ultrathin 'postcursor' films.\nThe existence of the ultrathin 'postcursor' film is an experimental finding that can be drawn on when choosing a theoretical approach to account for the pattern formation (see below). Note however, that at the moment there exists no explanation for its existence. A possible hypothesis is that the substrate strongly attracts the nanoparticles. As a result they form a dense suspension layer having a thickness roughly equal to the diameter of the nanoparticles. The observed mesoscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration suspension from the higher concentration suspension on the surface of the substrate.", - "page_start": 5, - "page_end": 6, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "Concerning the dewetting of nanoparticle solutions, how does the concentration of nanoparticle affect the main finger's width ?", - "target_page": 12, - "target_passage": "A quantitative analysis shows that the mean number of fingers depends only very weakly on the av- erage concentration of the nanoparticles ; only the mean finger width increases with increasing concentration", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "I. INTRODUCTION\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. However, these systems have not yet been investigated in any great depth. Such systems are complicated because their behaviour is determined by the interplay between the various solute (or colloid) and solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one has to distinguish between 'normal' convective dewetting and evaporative dewetting. A number of experiments have been performed employing (colloidal) solutions of polymers [22-25], macromolecules like collagen and DNA [26-31] and nanoparticles [32-40]. The latter are sometimes referred to as 'nanofluids'. The initial focus of much of the research in the field has been on investigating the structures that are formed which are similar to the ones observed in the 'classical' dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from spinodal dewetting and heterogeneous nucleation and growth, respectively. They are 'decorated' with the solute and therefore conserve the transient dewetting pattern as a dried-in structure when all the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may\n3\nalso shift the spinodal and binodal lines as compared to the locations of these lines in the phase diagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole nucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts. As a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A selection of images exhibiting some of the possible structures is displayed in Fig.1.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "A. Kinetic Monte Carlo model\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical two-dimensional Ising model [74]. For kT < kT c ≈ 0 . 567 liquid and vapour coexist when µ = µ coex = -2 . For µ > -2 [ µ < -2 ] eventually the liquid [vapour] dominates. A straight liquidgas interface will recede [advance] for µ < -2 [ µ > -2 ], i.e. one finds evaporative dewetting [wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid, for µ < -2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are present, they form dried-in structures when all the liquid evaporates. The final structures do not normally change any further - at least on short time scales. However, if the liquid wets the particles (i.e. is attracted to the particles), over long times there might be a coarsening of the structures, facilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by the evaporative dewetting process. They range from labyrinthine to polygonal network structures or holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when the average surface coverage of the nanoparticles ρ av n = 0 . 2 . Panels (a) and (b) result from a spinodal-like and nucleation and growth process, respectively. At first sight they look very similar to the patterns seen for the pure solvent and one might argue that the particles solely act as passive tracers and preserve the transient volatile dewetting structures of the solvent. This was suggested in Refs. [26-28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the particles may at times play a rather more significant role. When the diffusion of the particles is slow, the evaporative dewetting fronts become transversely unstable and may result in strongly ramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the stronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the mobility is larger.", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" - }, - { - "text": "B. Dynamical Density Functional theory\nFig. 4 presents two pairs of snapshots from a purely evaporative dewetting process deep inside the parameter region of the phase diagram where spinodal dewetting occurs. For small times the film becomes unstable showing a typical spinodal labyrinthine pattern with a typical wavelength. The nanoparticles concentrate where the remaining liquid is situated. However, they are 'slow' in their reaction: when ρ l already takes values in the range 0.08 - 0.83, the nanoparticle concentration has only deviated by about 25% from its initial value. The film thins strongly forming many\n17\nsmall holes. The competition for space results in a fine-meshed polygonal network of nanoparticle deposits. The concentration of particles is much higher at the network nodes - an effect that can not been seen within the KMC model. As the particles attract the liquid there remains some liquid on the substrate where the nanoparticles are.\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. At early times the straight front shows a rather short-wave instability, about 16 wiggles can be seen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 fingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger number remains constant, although new branches are continuously created and old branches join each other. In general, the results on fingering agree well with results obtained using the KMC model [41]. From this we conclude that jamming of discrete particles is not a necessary factor for causing the instability, since the fingering is seen here in a continuum model with a diffusion constant that is independent of the nanoparticle concentration. The DDFT is better suited than the KMC for investigations of the early instability stages: they are more easy to discern without the discrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of the one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations (in analogy to the approach used in Refs. [19, 86, 87]).", - "page_start": 16, - "page_end": 17, - "source_file": "1001.2669.pdf" - }, - { - "text": "I. INTRODUCTION\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the process quantitatively in the early nineties. In these experiments, that proved to be a paradigm in our understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is deposited on a flat silicon oxide substrate is brought above the glass transition temperature. The film ruptures in several places, forming holes which subsequently grow, competing for space. As a result, a random polygonal network of liquid rims emerges. The rims may further decay into lines of small drops due to a Rayleigh-type instability [1-3]. The related problems of retracting contact lines on partially wetting substrates and the opening of single holes in rather thick films have also been studied [4, 5].\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple non-volatile liquids and polymers (for reviews see Refs. [6-8]). All stages of the dewetting of a film are studied: the initial film rupture via nucleation or a surface instability (called spinodal dewetting) [1, 9-13], the growth process of individual holes [14-16], the evolution of the resulting hole pattern [3, 13], and the stability of the individual dewetting fronts [17-19]. We note in passing, that descriptions of dewetting patterns may also be found in historic papers, particularly for the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] considered turpentine on water and Marangoni [21, p. 352f] oil on water.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\n[34] P. Moriarty, M. D. R. Taylor, and M. Brust, 'Nanostructured cellular networks,' Phys. Rev. Lett. 89 , 248303 (2002).\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, 'Drying-mediated self-assembly of nanoparticles,' Nature 426 , 271-274 (2003).\n[36] L. V. Govor, G. Reiter, J. Parisi, and G. H. Bauer, 'Self-assembled nanoparticle deposits formed at the contact line of evaporating micrometer-size droplets,' Phys. Rev. E 69 , 061609 (2004).\n[37] C. P. Martin, M. O. Blunt, and P. Moriarty, 'Nanoparticle networks on silicon: Self-organized or disorganized?' Nano Lett. 4 , 2389-2392 (2004).\n[38] C. P. Martin, M. O. Blunt, E. Pauliac-Vaujour, A. Stannard, P. Moriarty, I. Vancea, and U. Thiele, 'Controlling pattern formation in nanoparticle assemblies via directed solvent dewetting,' Phys. Rev. Lett. 99 , 116103 (2007).\n[39] A. Stannard, C. P. Martin, E. Pauliac-Vaujour, P. Moriarty, and U. Thiele, 'Dual-scale pattern formation in nanoparticle assemblies,' J. Chem. Phys. C 112 , 15195-15203 (2008).\n[40] E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, I. Notingher, P. J. Moriarty, I. Vancea, and U. Thiele, 'Fingering instabilities in dewetting nanofluids,' Phys. Rev. Lett. 100 , 176102 (2008).", - "page_start": 27, - "page_end": 27, - "source_file": "1001.2669.pdf" - }, - { - "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold nanoparticles in toluene [33, 34, 37-40, 61]. The gold core of 2 - 3 nm diameter is coated by a layer of alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments ranges from 6 to 12 carbon atoms ( C 6 to C 12 ) [40]. By varying the chain length, one can control\n4\n(a)\n(b)\n(c)\nFIG. 1: (Colour online) Images of strongly ramified dewetting structures obtained using Atomic Force Microscopy in the case of (a) an aqueous collagen solution on graphite (courtesy of U. Thiele, M. Mertig and W. Pompe; see also Ref. [42]. Image size: 5 µ m × 5 µ m); (b) poly(acrylic acid) in water spin-coated onto a polystyrene substrate (reprinted with permission of John Wiley & Sons, Inc. from Ref. [23]; copyright John Wiley & Sons, Inc. 2002; Image size: 2 . 5 µ m × 2 . 5 µ m); and in both (c) and (d), a solution of gold nanoparticles in toluene, spin-coated onto native oxide terminated silicon substrates (scale bars given in panels). In all the images the lighter areas correspond to the deposited solute and the dark areas to the empty substrate.\n5\nto a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain silicon substrate that is covered by the native oxide layer only [34]. However, one may locally change the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding excess thiol one can also vary the properties of the solvent [40].", - "page_start": 3, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nWhen following the evolution of the branched patterns in situ (see the complementary video material of Ref. [40]), one clearly observes that different processes occur on different lenght scales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. The macroscopic front can be transversely unstable resulting in large-scale ( > 100 µ m) strongly anisotropic fingered structures. For fronts that move relatively quickly these macroscopic structures cover all the available substrate. However, when at a later stage the macroscopic front becomes slower, those fingers become scarce and 'macroscopic fingering' finally ceases. At this stage it is possible to appreciate that the seemingly dry region left behind by the front is not at all dry, but covered by an ultrathin 'postcursor' film that is itself unstable. The thickness of this film\n6\nis similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the ultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an unstable manner resulting in an array of isotropically branched structures as shown, e.g., above in Fig. 1. This indicates that at least some of the patterns described in the literature may have arisen from processes in similar ultrathin 'postcursor' films.\nThe existence of the ultrathin 'postcursor' film is an experimental finding that can be drawn on when choosing a theoretical approach to account for the pattern formation (see below). Note however, that at the moment there exists no explanation for its existence. A possible hypothesis is that the substrate strongly attracts the nanoparticles. As a result they form a dense suspension layer having a thickness roughly equal to the diameter of the nanoparticles. The observed mesoscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration suspension from the higher concentration suspension on the surface of the substrate.", - "page_start": 5, - "page_end": 6, - "source_file": "1001.2669.pdf" - }, - { - "text": "Acknowledgments\nBenard instability,' Phys. Rev. Lett. 88 , 164501 (2002).\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, 'Spontaneous formation of nanoparticle stripe patterns through dewetting,' Nat. Mater. 4 , 896-900 (2005).\n[51] S. H. Lee, P. J. Yoo, S. J. Kwon, and H. H. Lee, 'Solvent-driven dewetting and rim instability,' J. Chem. Phys. 121 , 4346-4351 (2004).\n[52] L. Xu, T. F. Shi, P. K. Dutta, and L. An, 'Rim instability by solvent-induced dewetting,' J. Chem. Phys. 127 , 144704 (2007).\n[53] L. Xu, T. F. Shi, and L. J. An, 'The dewetting dynamics of the polymer thin film by solvent annealing,' J. Chem. Phys. 129 , 044904 (2008).\n[54] M. Elbaum and S. G. Lipson, 'How does a thin wetted film dry up?' Phys. Rev. Lett. 72 , 3562-3565 (1994).\n[55] N. Samid-Merzel, S. G. Lipson, and D. S. Tannhauser, 'Pattern formation in drying water films,' Phys. Rev. E 57 , 2906-2913 (1998).\n[56] A. Padmakar, K. Kargupta, and A. Sharma, 'Instability and dewetting of evaporating thin water films on partially and completely wettable substrates,' J. Chem. Phys. 110 , 1735-1744 (1999).\n[57] A. V. Lyushnin, A. A. Golovin, and L. M. Pismen, 'Fingering instability of thin evaporating liquid films,' Phys. Rev. E 65 , 021602 (2002).\n[58] L. M. Pismen, 'Spinodal dewetting in a volatile liquid film,' Phys. Rev. E 70 , 021601 (2004).", - "page_start": 28, - "page_end": 28, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions (nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled transport and phase changes. These approaches range from microscopic discrete stochastic theories to mesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor film' that remains behind a mesoscopic dewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative dewetting front which results in highly branched fingering structures. The subtle interplay of decomposition in the film and contact line motion is discussed.\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ coupled evolution equations for the film thickness profile and mean particle concentration. The model is used to discuss the self-pinning and de-pinning of a contact line related to the 'coffee-stain' effect.\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as possible future developments and extensions.\nThe paper is published in: J. Phys.-Cond. Mat. 21 , 264016 (2009), in the Volume 'Nanofluids on solid substrates' and can be obtained at http://dx.doi.org/10.1088/0953-8984/21/26/264016\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "A. Kinetic Monte Carlo model\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting front moves, new branches are continuously created and existing branches merge at the moving contact line. However, the mean finger number in the streamwise direction of the resulting ramified pattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting\n10\nFIG. 2: Typical KMC results for the final dried-in nanoparticle structures resulting from the evaporative dewetting processes of nanoparticle solutions (nanofluids) in the case of (a) a spinodal-like process at µ = -2 . 55 , (b) nucleation and growth of holes at µ = -2 . 3 , (c) unstable fronts at µ = -2 . 3 and low mobility M = 5 , and (d) unstable fronts at µ = -2 . 3 and medium mobility M = 10 . The starting configuration in (a) and (b) is a homogeneous liquid film with uniformly distributed particles whereas in (c) and (d) a hole at the center is nucleated 'by hand'. The remaining parameters are (a,b) M = 50 , glyph[epsilon1] nl = 2 . 0 , glyph[epsilon1] nn = 1 . 5 , ρ av n = 0 . 2 , kT = 0 . 3 , MC steps = 500 , domain size 1200 × 1200 ; (c,d) ε nn = 2 . 0 , glyph[epsilon1] nl = 1 . 5 , ρ av n = 0 . 2 , kT = 0 . 2 , MC steps = 3000 , domain size 1200 × 1200 . Lattice sites occupied by particles are coloured black, and the empty sites are coloured white.\n11\npolymers which only result in fingers without side-branches [75] or fields of droplets left behind [18].", - "page_start": 9, - "page_end": 11, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "Which of ultrathin film or mesoscale hydrodynamics are best explained by kinetic Monte Carlo models ? ", - "target_page": 18, - "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "IV. CONCLUSION\nWe have discussed recent work on pattern formation processes in films and drops of evaporating suspensions/solutions of polymers and particles. After reviewing experiments on suspensions of thiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and phase change processes involved. A theoretical approach to the modelling of the hydrodynamics on the mesoscale has been described as well as more microscopic models for the dynamics in the observed nanoscopic 'postcursor' film. In particular, we have introduced (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to investigate and understand the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor' film that remains behind the mesoscopic dewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n23\nscopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion within the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquidparticle and particle-particle interactions into account and therefore allows us to distinguish different regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport regime where the instability is almost completely independent of the interaction strengths and a demixing regime where particles and liquid demix at the receding front thereby increasing its transverse instability.", - "page_start": 22, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "III. MODELLING APPROACHES\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanoparticles are not taken into account. However, under certain conditions one can augment equation (1) for the evolution of the film thickness by coupling it to an equation for the evolution of the mean particle concentration. The resulting model is able to describe the behaviour of an evaporating solution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. Weshould expect such a model to describe the mesoscopic dewetting front discussed above. However, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\nfilm.\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a discrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on evaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The validity of this strong assumption regarding the relevant transport processes can be confirmed from an estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The convective mobility is proportional to h 3 , i.e., it is large for thick films but decreases strongly with reduced film thickness. The evaporative mobility, however, is a constant, implying that evaporation will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] and a small contact angle ( ≈ 0 . 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film and may explain why one has such good agreement between the experimentally observed patterns and the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model [35]. We introduce the KMC model below in Section III A.", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "C. Thin film hydrodynamics\nThe previous two sections focused on two approaches to describe the experimentally observed patterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewetting front. Although both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the framework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach by considering an isothermal situation where the nanoparticles are not surface active, i.e., they do not act as surfactants. For a model incorporating the effects of latent heat generation and surfaceactive particles resulting in thermal and solutal Marangoni stresses, see Ref. [88]. A description of spreading particle solutions incorporating a structural disjoining pressure has also been considered [89]. For related work on particle-laden film flow on an incline see Refs. [90, 91].\nOne starts from the Stokes equations, together with continuity, no-slip boundary conditions at the\n18\nsubstrate and force equilibria at the free surface, and applies a long-wave approximation. Under the assumption that concentrations equilibrate rapidly over the film thickness, we obtain coupled non-linear evolution equations for the film thickness profile h ( x, t ) and the amount of nanoparticles per unit length h p = φh , where φ is the volume concentration of the nanoparticles. Note, that h p corresponds to the local thickness of the nanoparticle layer when all the solvent is evaporated. The resulting evolution equation for the film thickness is Eq. (1) above and focusing on the influence of particle-independent capillarity and wettability only, the energy functional F [ h ] is given by Eq. (2) above. Note that the viscosity η depends on the particle concentration. Following Refs. [88, 89, 91, 92] we use the Quemada law for dense suspensions [93-95]\nη ( φ ) = η 0 ( 1 -φ φ c ) -2 (8)", - "page_start": 17, - "page_end": 18, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions (nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled transport and phase changes. These approaches range from microscopic discrete stochastic theories to mesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor film' that remains behind a mesoscopic dewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative dewetting front which results in highly branched fingering structures. The subtle interplay of decomposition in the film and contact line motion is discussed.\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ coupled evolution equations for the film thickness profile and mean particle concentration. The model is used to discuss the self-pinning and de-pinning of a contact line related to the 'coffee-stain' effect.\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as possible future developments and extensions.\nThe paper is published in: J. Phys.-Cond. Mat. 21 , 264016 (2009), in the Volume 'Nanofluids on solid substrates' and can be obtained at http://dx.doi.org/10.1088/0953-8984/21/26/264016\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "A. Kinetic Monte Carlo model\nWe note also that the fingering process may be viewed as self-optimising the front motion - i.e. the front keeps its average velocity constant by expelling particles into the fingers. A similar effect exists for dewetting polymer films [18], where liquid is expelled from the growing moving rim which collects the dewetted polymer. There, the surplus liquid is left on the surface as a droplet pattern.\nThe kinetic Monte Carlo model is a very useful tool that helps one to understand the pattern formation in drying nanoparticle suspensions. One has, however, to keep in mind the restrictions\n13\non the model (see above). The purely two-dimensional character of the KMC was extended to a 'pseudo three-dimensional' one by making the effective chemical potential dependent on the mean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to the introduction of a 'global' thickness-dependent disjoining pressure into the evaporation term without an explicit consideration of a film thickness. The amended model can reproduce bimodal structures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully threedimensional models are also discussed in the literature [76, 77].", - "page_start": 12, - "page_end": 13, - "source_file": "1001.2669.pdf" - }, - { - "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nWhen following the evolution of the branched patterns in situ (see the complementary video material of Ref. [40]), one clearly observes that different processes occur on different lenght scales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. The macroscopic front can be transversely unstable resulting in large-scale ( > 100 µ m) strongly anisotropic fingered structures. For fronts that move relatively quickly these macroscopic structures cover all the available substrate. However, when at a later stage the macroscopic front becomes slower, those fingers become scarce and 'macroscopic fingering' finally ceases. At this stage it is possible to appreciate that the seemingly dry region left behind by the front is not at all dry, but covered by an ultrathin 'postcursor' film that is itself unstable. The thickness of this film\n6\nis similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the ultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an unstable manner resulting in an array of isotropically branched structures as shown, e.g., above in Fig. 1. This indicates that at least some of the patterns described in the literature may have arisen from processes in similar ultrathin 'postcursor' films.\nThe existence of the ultrathin 'postcursor' film is an experimental finding that can be drawn on when choosing a theoretical approach to account for the pattern formation (see below). Note however, that at the moment there exists no explanation for its existence. A possible hypothesis is that the substrate strongly attracts the nanoparticles. As a result they form a dense suspension layer having a thickness roughly equal to the diameter of the nanoparticles. The observed mesoscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration suspension from the higher concentration suspension on the surface of the substrate.", - "page_start": 5, - "page_end": 6, - "source_file": "1001.2669.pdf" - }, - { - "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\n-24.2 K, that we have employed in our simulations. The given values for the exchange constants are the same already used by Weschke et al. in Ref. 13 to interpret experimental data on Holmium films on the basis of a J 1 -J 2 model, after a proper scaling by the numbers of NN and NNN on neighboring layers of a BCT lattice.\nIn the following we will denote with n the film thickness, i.e. the number of spin layers along the z direction, and with L × L the number of spins in each layer (i.e., L is the lattice size along both the x and y directions). In our simulations thickness values from 1 to 24 were considered, while the range of lateral size L was from 8 to 64. Periodic boundary conditions were applied along x and y , while free boundaries were obviously taken along the film growth direction z .\nThermal equilibrium was attained by the usual Metropolis algorithm 19 , supplemented by the overrelaxed technique 20 in order to speed-up the sampling of the spin configuration space: a typical 'Monte Carlo step' was composed by four Metropolis and four-five over-relaxed moves per particle. Such judicious mix of moves is able both to get faster the thermal equilibrium and to minimize the correlation 'time' between successive samples, i.e. the undesired effects due to lack of in-\ndependence of different samples during the measurement stage. For each temperature we have usually performed three independent simulations, each one containing at least 2 × 10 5 measurements, taken after discarding up to 5 × 10 4 Monte Carlo steps in order to assure thermal equilibration.\nIn the proximity of the critical region the multiple histogram (MH) technique was also employed 21 , as it allows us to estimate the physical observables of interest over a whole temperature range in a substantially continuous way by interpolating results obtained from sets of simulations performed at some different temperatures.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0510.pdf" - }, - { - "text": "A. Kinetic Monte Carlo model\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. However, as the system 'dries in' during the course of the solvent evaporation, the final nanoparticle configurations do not necessarily represent equilibrium structures. This implies that the system dynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their relative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) evaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility M corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of\n9\ntime scales for evaporation and diffusion. A large mobility M indicates fast diffusion as compared to evaporation. A trial move is accepted with the probability p acc = min[1 , exp( -∆ E/kT )] where k is the Boltzmann constant, T the temperature and ∆ E is the change in energy resulting from the potential move. Note that particles are only allowed to move into wet areas of the substrate, i.e., onto cells with l = 1 . This models zero diffusivity of the particles on a dry substrate. The replaced liquid fills the site left by the nanoparticle.", - "page_start": 8, - "page_end": 9, - "source_file": "1001.2669.pdf" - }, - { - "text": "Management's Discussion and Analysis of Financial Condition and Results of Operations\nInvestments in unconsolidated affiliates in 2004 primarily consist of contributions to The Residences at MGM Grand. In 2003 and 2002, such investments were primarily our required investments in Borgata. In 2002, we also contributed $44 million to Monte Carlo in connection with Monte Carlo's retirement of the final $87 million of its outstanding debt.", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "IV. CONCLUSION\nThe dynamical density functional theory describes the coupled dynamics of the density fields of the liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional hamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evaporating ultrathin film and also to investigate the influence of processes such as surface diffusion by the liquid, which are not incorporated in the KMC model. However, it is straightforward to extend the theory to consider a fully three-dimensional fluid film, in which one can distinguish between short- and long-range interactions of solvent and/or solute with the substrate. We have, however, restricted the examples given here to situations that can also be described using the KMC model. A further exploration will be presented elsewhere.\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It results from a long-wave approximation and consists of coupled evolution equations for the film thickness profile and the mean particle concentration. It has been used to discuss the self-pinning of receding contact lines that is related to the formation of rings of dried-in particles (coffeestain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the combined effects of convection and evaporation.\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques that allow one to produce hierarchically structured functional layers for a wide range of applications such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly towards increasingly complex systems. For example, there have been investigations of the influence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal particles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evaporating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of a secondary phase separation on evaporation-induced pattern formation in polymer films [102], and of the influence of an imposed flow on decomposition and deposition processes in a sliding ridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "What is AgMERRA ?", - "target_page": 2, - "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Voting and comments made at the Company's 2012 AGM\nThe table below provides a summary of the Board's action and / or comments in response to concerns raised by shareholders at the 2012 AGM in relation to remuneration.", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "NOTE 10 - COMMITMENTS AND CONTINGENCIES\nMacau. In connection with the Company's pending joint venture in Macau (see Note 1), the Company has committed to invest up to $280 million in the entity in the form of capital contributions and shareholder loans.\nNew York Racing Association. The Company has an understanding with the New York Racing Association ('NYRA') to manage video lottery terminals ('VLTs') at NYRA's Aqueduct horseracing facility in metropolitan New York. The Company would assist in the development of the facility, including providing project financing, and would manage the facility for a fee. Work was halted on the VLT facility in August 2003 pending the outcome of an investigation of certain aspects of NYRA's operations by Federal prosecutors. In December 2003, NYRA reached agreement with the Justice Department whereby NYRA was indicted with prosecution deferred. NYRA agreed to pay a fine and the indictment will be dismissed with prejudice upon NYRA implementing certain reforms and otherwise complying with the terms of the agreement. The Company's participation is subject to a definitive agreement, regulatory approvals and certain legislative changes by the State of New York.\nThe Residences at MGM Grand. In July 2004, the venture obtained construction financing for up to $210 million for the development of the first tower. The Company has provided a guaranty for up to 50% of the interest and principal payment obligations on the construction financing as well as a joint and several completion guaranty with its partners. The Company recorded the value of the guaranty obligation, approximately $2 million, in other long-term liabilities.\nOther Guarantees. The Company is party to various guarantee contracts in the normal course of business, which are generally supported by letters of credit issued by financial institutions. The Company's Senior Credit Facility limits the amount of letters of credit that can be issued to $200 million, and the amount of available borrowings under the Senior Credit Facility is reduced by any outstanding letters of credit. At December 31, 2004, the Company had provided a $50 million letter of credit to support the Economic Development Corporation of the City of Detroit bonds referred to above, which are a liability of the Company.\nLitigation. The Company is a party to various legal proceedings, most of which relate to routine matters incidental to its business. Management does not believe that the outcome of such proceedings will have a material adverse effect on the Company's financial position or results of operations.", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Materials and methods\nData processing. In this study, historical daily weather data (1986-2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. /T_he dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data 45 .\nFor future (2020-2099), the original climate scenario data (Table 1) were extracted from output archives of /five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) under four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. /T_he climate scenario data was interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations to remove systematic errors 46 . /T_he data of maize-planting regions are from the gridded global dataset in 2000 by combining two data products 47,48 .\nSimulation of climate scenarios with global warming by ͷ.ͻ °C and ͸.Ͷ °C. In this study, climate data of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models driven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a total of 20 sets of data under four RCP scenarios of /five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSLCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sunshine hours (Fig. 1).\n͸\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/", - "page_start": 1, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "Disclosure Controls and Procedures\nWe carried out an evaluation, under the supervision and with the participation of our management, including our Chief Executive OÇcer and Chief Financial OÇcer, of the eÅectiveness of our disclosure controls and procedures as of the end of the period covered by this Annual Report. Based upon that evaluation, our Chief Executive OÇcer and Chief Financial OÇcer concluded that our disclosure controls and procedures were eÅective as of the end of the period covered by this Annual Report in accumulating and communicating to our management, including our Chief Executive OÇcer and Chief Financial OÇcer, material information required to be included in the reports we Ñle or submit under the Securities Exchange Act of 1934 as appropriate to allow timely decisions regarding required disclosure.", - "page_start": 94, - "page_end": 94, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Management's Discussion and Analysis of Financial Condition and Results of Operations\nIn February 2004, we announced an agreement in principle with The British Land Company PLC whereby we would operate a casino in leased premises within a newly developed leisure and entertainment complex adjacent to the Meadowhall Shopping Centre in Sheffield. The agreement is subject to the implementation of proposed gaming law reforms and a tax structure acceptable to us, and obtaining required planning and other approvals.\nMacau. In June 2004, we entered into a joint venture agreement with Pansy Ho Chiu-king to develop, build and operate a hotel-casino resort in Macau S.A.R. The facility, which will use the 'MGM Grand' name, will be located on a prime waterfront site and will include world-class resort amenities including a hotel, restaurants, entertainment facilities, convention, retail and spa facilities in addition to a significant gaming component. The agreement is subject to, among other things, the approval of the government of Macau S.A.R. and other regulatory approvals as well as the entry into a subconcession agreement with Sociedade de Jogos de Macau (SJM), the holder of one of the existing concessions to operate a casino in Macau. The Company has committed to invest up to $280 million in the entity in the form of capital contributions and shareholder loans. The complete design, timing, cost and scope of the project are at a preliminary stage and are subject to the risks attendant to large-scale projects.\nNew York Racing Association. We have an understanding with the New York Racing Association ('NYRA') to manage VLTs at NYRA's Aqueduct horseracing facility in metropolitan New York. We would assist in the development of the facility, including providing project financing, and would manage the facility for a fee. Work was halted on the VLT facility in August 2003 pending the outcome of\nManagement's Discussion and Analysis of Financial Condition and Results of Operations\nan investigation of certain aspects of NYRA's operations by Federal prosecutors. In December 2003, NYRA reached agreement with the Justice Department whereby NYRA was indicted with prosecution deferred. NYRA agreed to pay a fine and the indictment will be dismissed with prejudice upon NYRA implementing certain reforms and otherwise complying with the terms of the agreement. Our participation is subject to a definitive agreement, regulatory approvals and certain legislative changes by the State of New York.", - "page_start": 39, - "page_end": 40, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Chief Executive Officer Akara Resources PCL\nPakorn Sukhum joined the management team of Akara Resources PCL as Chief Executive Officer at the end of 2009. He brings to Akara over 24 years of industrial commercial managerial experience in various industries such as metallurgy, chemicals and ceramics in international and domestic markets of Thailand, having held senior management positions in both Thai and Multinational joint venture companies such as Basell Poyolefins, Bayer AG as well as Padeang Industry of Thailand. His major contributions and responsibilities have ranged from project management, commercial marketing and sales to business development.\nDirectors' Report\n42\nRemuneration Report . . . . . . . . . . . . . . 49\nAuditor's Independence Declaration 62\nDirect or s' Report", - "page_start": 41, - "page_end": 42, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "F. Scott Dueser\nPresident and Chief Executive Officer", - "page_start": 94, - "page_end": 94, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "4.2 Using a Reasoner\nYou may notice that one or more of your classes is highlighted in red as in Figure 4.5. This is because we haven't run the reasoner yet so Protégé has not been able to verify that our new classes have no inconsistencies. When just creating classes and subclasses in a new ontology there is little chance of an inconsistency. However, it is a good idea to run the reasoner often. When there is an inconsistency the sooner it is discovered the easier it is to fix. One common mistake that new users make is to do a lot of development and then run the reasoner only to find that there are multiple inconsistencies which can make debugging significantly more difficult. So let's get into the good habit of running the reasoner often. Protégé comes with some reasoners bundled in and others available as plugins. Since we are going to write some SWRL rules later in the tutorial, we want to use the Pellet reasoner. It has the best support for SWRL at the time this tutorial is being written.", - "page_start": 15, - "page_end": 15, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Looking Ahead\nOver the current financial year and beyond, Kingsgate remains focused on optimising production within an uncertain metal price environment, continuing to build resources and reserves and advancing the development project pipeline of Nueva Esperanza and Bowdens. These initiatives are designed to grow earnings per share for the benefit of all shareholders.\nIn late September, Kingsgate's Thai subsidiary, Akara Resources Public Company Limited ('Akara') has submitted its listing application and draft Prospectus to the Thai Securities Exchange Commission (SEC) and the Stock Exchange of Thailand (SET) for an initial public offering of its shares on the SET.\nThe SEC and SET will review the draft Prospectus in the coming months in order to approve the listing of Akara. The decision to list Akara will depend on market conditions and other factors at the time of approval.\nGroup gold production for the full year to 30 June 2014 is expected to be in the range of 190,000 to 210,000 ounces. This includes 120,000 to 130,000 ounces from Chatree and 70,000 to 80,000 ounces from Challenger.\nMD and CEO' s Report", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "REPUBLIC SERVICES, INC.\nBy: /s/\nJAMES E. O'CONNOR\nJames E. O'Connor Chairman of the Board and Chief Executive OÇcer (principal executive oÇcer)", - "page_start": 100, - "page_end": 100, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "In 2018, what was the global proportion of maize grown in the US ?", - "target_page": 5, - "target_passage": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Discussion and conclusion\n/T_hirdly, there are relatively more researches on the prediction of climate change trend under the background of 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in worldwide is few. In the meantime, we do not assess the e/ffect of future changes on agriculture, such as increases in farm productivity due to new technology. /T_he maize planting area in the future is assumed to be the same as the current situation of maize cultivation in the world.\nConclusion. According to the simulation results, the yield of maize under global warming by 2.0 °C would decrease between 3.0 and 18.7% in the worldwide relative to 1986-2005; the maize yield would /fluctuate between - 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 high-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% under global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among di/fferent countries and regions. So, it is urgent for all countries to pay enough attention to the loss risk of maize yield and take actions of mitigation and adaptation to climate change. /T_he time le/f_t for changing our minds and actions is becoming less and less.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nAccording to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. /T_he United States accounts for more than 32%; China accounts for about 24%; Brazil, Argentina and Mexico account for about 23%. /T_he /fluctuation of maize production in these /five top countries will have a signi/ficant impact on the global maize trade. Based on the simulation results, comparing to 1986-2005, the maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss rate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. However, there would be increasing trends in the United States and Mexico; the change in the United States would not be signi/ficant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming\nScientific Reports | (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\n;\nwww.nature.com/scientificreports/\nFigure 5. (continued)\nby 1.5 °C. According to the simulation results, comparing to 1986-2005, the maize yield in the United States, China and Brazil would decrease under global warming by 2.0 °C; the yield loss rate would reach more than 24% in Brazil; the United States would decrease by 13.3%; China would decrease by 11.5%. However, there would be increasing trends in Argentina and Mexico; the maize yield would increase by 16.8% in Argentina; the yield increasing rate would exceed 40% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 11.4% under global warming by 2.0 °C. By comparing the maize production in di/fferent countries, it can be found that the reduction trend of total maize production in the top /five countries is more obvious, especially under the scenario of global warming by 2.0 °C, the global food trade and food security may face greater risks.", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\n/T_here are apparent trends of humidi/fication in most regions under global warming by 1.5 °C and 2.0 °C; but the drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is 73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; the area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the area is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere and the middle regions of Northern Hemisphere. /T_he distribution of precipitation under global warming by 2.0 °C is similar with the situation under global warming by 1.5 °C. /T_he drought-threatened area would increase by 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; the area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the extreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than those under global warming by 1.5 °C, which is what we should be pay more attention to.\nYield change of maize under global warming by ͷ.ͻ °C and ͸.Ͷ °C. Maize production is a/ffected by climate change apparently. According to the simulation results of CERES-maize, the yield of maize would decrease in the worldwide relative to 1986-2005 under global warming by 2.0 °C; it would increase little under global warming by 1.5 °C. /T_he distributions of maize yield loss under the two scenarios are similar to each other, mostly located in the middle and low latitude, which are the main regions for maize planting in the world. /T_he loss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of 1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize planting area in the world, in which the climate situation would become more proper for maize under global\nͻ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nFrom the results simulated by IPSL-CM5A-LR model under RCP 2.6 scenario, the gross yield of maize in the world between 2020 and 2039 would decrease by 6.8% relative to 1986-2005. /T_he area is 37.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%, mainly located in the low and middle latitude of South America and Asia, and the middle latitude of Africa and North America. /T_he area is 16.4% of the whole maize planting regions, in which the yield loss would be more than 50%, mainly located in the low latitude of South America and the middle latitude of Asia and Europe. /T_he area is 45.8% of the whole maize planting regions, in which the yield would increase, mainly located in the low latitude of Africa, Asia and North America, the high latitude of Europe. From the results simulated by the GFDL-ESM2M model under RCP 4.5 scenario, the gross yield of maize in the world between 2041 and 2060 would increase by 7.2% relative to 1986-2005. /T_here are opposite trends of maize yield under global warming by 1.5 °C, which are simulated by di/fferent global climate models. However, the spatial distributions of maize yield change are similar to each other. /T_he di/fference is that the regions of high yield loss rate are decreasing, and the regions of yield increasing are going up. In a comprehensive perspective, under global warming by 1.5 °C, maize yield in the whole world would increase 0.18% relative to 1986-2005 (Fig. 3). According to Paris Agreement, all countries should do their best to limit the global warming by 1.5 °C until the end of 21 century. If that objective could be accomplished, gross maize production of the whole world would not be in/fluenced so much by climate change, but the food\nͼ\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nFrom the view of continents, there are di/fferent trends of maize yield changes in the 6 continents (except Antarctica) under global warming by 1.5 °C and 2.0 °C (Fig. 6). From the results of simulated by CRESE-maize under global warming by 1.5 °C, the maize yield in 3 continents would decline apparently, including South America, Europe and Oceania; the average yield loss rates are respectively - 15.6%, - 12.4%, - 36.4%; in the other 3 continents the average maize yield would go up, especially in Africa more than 30%; the increasing trends are slight in Asia and North America, in which the yield increasing rates are separately 0.7% and 0.4%. However, the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are di/fferent in 2 continents, including Asia and North America. From the results of simulated by CRESE-maize under global warming by 2.0 °C, the maize yield in 5 continents would decline apparently, except Africa; the average yield loss rates are respectively - 7.9% (Asia), - 14.1% (North America), - 9.3% (South America), - 22.5% (Europe), - 25.5% (Oceania); only in Africa the average maize yield would go up also more than 30%; meanwhile the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are the same in each continent. Comparing the two global warming scenarios, there would be apparent variations in maize yield in Asia and North America, in which the annual maize yield accounts for a great proportion of the whole world, leading to a much more serious yield loss under global warming by 2.0 °C than that under global warming by 1.5 °C. /T_here would be an obvious crisis of food supply under global warming by 2.0 °C with the increasing population in the future. So, it is important to make full preparation for adaptation to climate change in the whole world.\nͿ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nFigure 5. Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C.\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should be taken from now on. Food security would be a signi/ficant challenge in this century.\nYield change of maize in main countries. /T_here are huge di/fferences in impacts on maize yield under climate change, which would in/fluence the food crisis in di/fferent regions. /T_here are 159 countries in the whole world which plant maize. /T_he gross yield of maize the top 20 countries accounts for more than 90% of the total yield in the 159 countries. So, the changes in the top 20 countries under future scenarios would in/fluence the food security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming by 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become 33.5%. /T_here would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly increase. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which the mean yield loss rate is approximate to that under global warming by 1.5 °C. /T_here would be 77 countries experiencing yield increase; however, the mean yield increase is apparently smaller than that under global warming by 1.5 °C. Generally, the global maize yield would decrease. /T_he results show that the adverse e/ffect of warming up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to develop forward-looking adaptation measures to cope with future climate change.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nFigure 1. Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs under 4 RCP scenarios. Note: /T_he black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black vertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models and scenarios.\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, including the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scienti/fic community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. /T_hen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the e/ffects of the resulting maize production shocks in di/fferent countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "Materials and methods\nFirst maize yields across the world during the historical period 1986-2005 were simulated at the 0.5° × 0.5° grid scale with two main production systems, including Spring maize and Summer maize. Historical national maize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from the gridded global dataset by combining two data products 47 . Second, genetic parameters of speci/fic cultivars of maize from previous works were adopted for the initial parameters; model parameters related to crop genotype characteristics were calibrated and tuned following the method in Xiong et al. 52 , in which the simulated yields from 1986-2005 were comparable to the statistical data. /T_hird, maize yields across the world were simulated under global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from gridded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, comparing maize yield average for 1986-2005.\nSimulation of market price using GTAP. /T_he yield changes for maize from the DSSAT models under 1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes in production, market price, and self-su/fficiency ratio of maize at national and global levels 53,54 . For this study, we use a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of the major food crops under current economic conditions. Utilizing current economic conditions has the advantage of minimizing assumptions and model uncertainties related to future economic conditions 55,56 .\n/T_he original GTAP database doesn't include maize as a separate sector, rather it is combined with other coarse grains to form an 'other coarse grain' sector. For this study, we updated the GTAP database by splitting maize from the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the original database. /T_he detailed method is given as follows:", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nFrom the results of simulated by the NorESM1-M model under RCP 4.5 scenario, the gross yield of maize in the world between 2060 and 2079 would decrease by 18.7% relative to 1986-2005. /T_he area is 41.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%. /T_he area is 15.6% of the whole maize planting regions, in which the yield loss would be more than 50%. /T_he area is 42.7% of the whole maize planting regions, in which the yield would increase. /T_he distribution of maize yield change is similar to that under global warming by 1.5 °C. From the results simulated by the GFDL-ESM2M model under RCP 6.0 scenario, the gross yield of maize in the world between 2065 and 2084 would decrease by 3% relative to 1986-2005. Comparing to the results of the NorESM1-M model, the regions of high yield loss rate are increasing, and the regions of yield increases are going down; but the per unit area yields are increasing quickly in the regions of yield increasing. So, the gross maize yield in the whole world simulated by the GFDL-ESM2M model is more than the NorESM1-M model. In a comprehensive perspective, under global warming by 2.0 °C, maize yield in the whole world would decrease 10.8% relative to 1986-2005 (Fig. 4). Compared to the results under global warming by 1.5 °C, the risk of yield loss is much higher. According to the new results from the Emission Gap Report in 2019, the target of global warming by 1.5 °C would not be implemented according to the reality of mitigation actions; the chance become much bigger for all countries in the world, who will be facing the severe challenge of global temperature rise of 2.0 °C or even higher (3.0 °C or 4.0 °C) in the future. So it is critical to cope with the serious condition\nͽ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "Discussion and conclusion\nDiscussion. Our analysis highlights the e/ffects of climate change on global- and regional-speci/fic maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We /find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warming by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. /T_he limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\nͷͶ\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/\nFigure 7. Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C.\nFigure 8. Changes in Self-su/fficiency ratio of maize in main countries under global warming by 1.5 °C and 2.0 °C.\nmeantime, the huge di/fferences in yield changes in di/fferent regions provide a small chance for the world, especially under global warming by 1.5 °C. In the near future, if the global temperature can be e/ffectively controlled under 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. All regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the potentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the yield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 10, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "What would be the price increase resulting from maize production changes due to 1.5°C and 2°C global temperature increase ?", - "target_page": 10, - "target_passage": "In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nFor TXx, the difference between 2°C and 1.5°C global warming is larger than the 0.5°C difference in global mean temperature across most of the land surface in all ensemble members (figure 14). Although some ensemble members simulate local temperatures to be higher at 1.5°C global warming than 2°C in some small regions, these are relatively localized and most regions are cooler at 1.5°C global warming than 2°C. In many regions, the difference is between 0.5°C and 1.0°C, but many other regions see larger differences. In several ensemble members, the difference is 1.5°C, 2��C or larger in large parts of North America, South America, Europe and China. For example, over parts of Europe, where annual maximum daily temperature was projected to increase by over 5°C for a 2°C global warming, the local increase is limited to 3-4°C for 1.5°C global warming. Limiting global warming by half a degree Celsius would, therefore, limit maximum temperatures by three or four times as much in those areas (figure 14).\nAt 1.5°C global warming, although the increases in TXx are smaller than at 2°C, these increases show similar geographical patterns as for 2°C in all ensemble members, with larger changes in continental interiors especially in the mid-latitudes (not shown).\nThe percentage of days exceeding the 90th percentile of daily temperature (Tx90p) also increases less at 1.5°C global warming than at 2°C (figure 15). The largest reductions are in the tropics, where the largest increase was seen at 2°C; whereas at 2°C global warming, 50% or more\n16\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed11.pdf" - }, - { - "text": "Discussion and conclusion\n/T_hirdly, there are relatively more researches on the prediction of climate change trend under the background of 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in worldwide is few. In the meantime, we do not assess the e/ffect of future changes on agriculture, such as increases in farm productivity due to new technology. /T_he maize planting area in the future is assumed to be the same as the current situation of maize cultivation in the world.\nConclusion. According to the simulation results, the yield of maize under global warming by 2.0 °C would decrease between 3.0 and 18.7% in the worldwide relative to 1986-2005; the maize yield would /fluctuate between - 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 high-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% under global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among di/fferent countries and regions. So, it is urgent for all countries to pay enough attention to the loss risk of maize yield and take actions of mitigation and adaptation to climate change. /T_he time le/f_t for changing our minds and actions is becoming less and less.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" - }, - { - "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nFigure 1. Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs under 4 RCP scenarios. Note: /T_he black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black vertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models and scenarios.\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, including the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scienti/fic community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. /T_hen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the e/ffects of the resulting maize production shocks in di/fferent countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\n/T_here are apparent trends of humidi/fication in most regions under global warming by 1.5 °C and 2.0 °C; but the drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is 73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; the area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the area is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere and the middle regions of Northern Hemisphere. /T_he distribution of precipitation under global warming by 2.0 °C is similar with the situation under global warming by 1.5 °C. /T_he drought-threatened area would increase by 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; the area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the extreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than those under global warming by 1.5 °C, which is what we should be pay more attention to.\nYield change of maize under global warming by ͷ.ͻ °C and ͸.Ͷ °C. Maize production is a/ffected by climate change apparently. According to the simulation results of CERES-maize, the yield of maize would decrease in the worldwide relative to 1986-2005 under global warming by 2.0 °C; it would increase little under global warming by 1.5 °C. /T_he distributions of maize yield loss under the two scenarios are similar to each other, mostly located in the middle and low latitude, which are the main regions for maize planting in the world. /T_he loss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of 1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize planting area in the world, in which the climate situation would become more proper for maize under global\nͻ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed9.pdf" - }, - { - "text": "Discussion and conclusion\nDiscussion. Our analysis highlights the e/ffects of climate change on global- and regional-speci/fic maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We /find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warming by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. /T_he limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\nͷͶ\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/\nFigure 7. Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C.\nFigure 8. Changes in Self-su/fficiency ratio of maize in main countries under global warming by 1.5 °C and 2.0 °C.\nmeantime, the huge di/fferences in yield changes in di/fferent regions provide a small chance for the world, especially under global warming by 1.5 °C. In the near future, if the global temperature can be e/ffectively controlled under 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. All regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the potentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the yield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 10, - "source_file": "pubmed9.pdf" - }, - { - "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nKuo Li ͷ * , Jie Pan ͷ , Wei Xiong ͸ , Wei Xie ͹ & Tariq Ali ͹\nClimate change is becoming more and more remarkable which has an obvious impact on crop yields all over the world. Future climate scenario data was simulated by ͻ climate models recommended by ISI-MIP under ͺ RCP scenarios, in which the approximate scenarios with global warming by ͷ.ͻ °C and ͸ °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the world under global warming by ͷ.ͻ °C and ͸.Ͷ °C were analyzed and the market prices of maize at national and global levels were simulated. The results showed that, the risk of maize yield reduction under ͸.Ͷ °C scenario was much more serious than ͷ.ͻ °C scenario; the ratios of yield changes were separately Ͷ.ͷ;% and - ͷͶ.;% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. The reduction trend of total maize production is obvious in the top five countries and the main producing regions of the world, especially under the ͸.Ͷ °C scenario. The market price of maize would increase by around Ͷ.ͽ% and ͹.ͺ% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. With the quickly increasing population in the world, it is urgent for all countries to pay enough attention to the risk of maize yield and take actions of mitigation and adaptation to climate change.\nIn the past hundred years, the global climate has experienced great changes 1-4 . According to the sixth assessment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and almost all regions in the world experienced surface warming 5 . Due to global warming, the extreme climate events become more and more frequent, and the ecological environment problems caused by climate change are more and more serious, which restrict the sustainable development of human society and health 6-10 . Global warming has gradually changed from a scienti/fic issue to a major social issue of common concern to governments and people of all countries 11-13 . In 2016, nearly 200 parties of the United Nations Framework Convention on climate change reached the Paris Agreement at the climate change conference in Paris 14 . Paris Agreement has indicated and pursue e/fforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nFigure 5. Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C.\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should be taken from now on. Food security would be a signi/ficant challenge in this century.\nYield change of maize in main countries. /T_here are huge di/fferences in impacts on maize yield under climate change, which would in/fluence the food crisis in di/fferent regions. /T_here are 159 countries in the whole world which plant maize. /T_he gross yield of maize the top 20 countries accounts for more than 90% of the total yield in the 159 countries. So, the changes in the top 20 countries under future scenarios would in/fluence the food security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming by 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become 33.5%. /T_here would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly increase. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which the mean yield loss rate is approximate to that under global warming by 1.5 °C. /T_here would be 77 countries experiencing yield increase; however, the mean yield increase is apparently smaller than that under global warming by 1.5 °C. Generally, the global maize yield would decrease. /T_he results show that the adverse e/ffect of warming up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to develop forward-looking adaptation measures to cope with future climate change.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "Materials and methods\nFirst maize yields across the world during the historical period 1986-2005 were simulated at the 0.5° × 0.5° grid scale with two main production systems, including Spring maize and Summer maize. Historical national maize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from the gridded global dataset by combining two data products 47 . Second, genetic parameters of speci/fic cultivars of maize from previous works were adopted for the initial parameters; model parameters related to crop genotype characteristics were calibrated and tuned following the method in Xiong et al. 52 , in which the simulated yields from 1986-2005 were comparable to the statistical data. /T_hird, maize yields across the world were simulated under global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from gridded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, comparing maize yield average for 1986-2005.\nSimulation of market price using GTAP. /T_he yield changes for maize from the DSSAT models under 1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes in production, market price, and self-su/fficiency ratio of maize at national and global levels 53,54 . For this study, we use a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of the major food crops under current economic conditions. Utilizing current economic conditions has the advantage of minimizing assumptions and model uncertainties related to future economic conditions 55,56 .\n/T_he original GTAP database doesn't include maize as a separate sector, rather it is combined with other coarse grains to form an 'other coarse grain' sector. For this study, we updated the GTAP database by splitting maize from the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the original database. /T_he detailed method is given as follows:", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "Results\nFigure 6. Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.\nMarket price of maize in main countries. In this study, we elaborate on the endogenous response of our economic models. /T_his response can be theoretically elaborated as: due to the e/ffect of climate change on yield reduction (improvement), the supply curve moves le/f_tward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shi/f_ting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. /T_his also alters the self-su/fficiency ratios of each country/ region due to climate change.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\n-\ndays were projected to exceed the baseline 10th percentile, at 1.5°C this reduces by 15-20% or more. Again, the patterns of change at 1.5°C retain a similar geographical pattern of greater increases in the tropics than mid-latitudes (electronic supplementary material).\n17\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nFigure 12. Comparison of global mean changes in climate extremes indices relative to 1981-2010 at 2 ° Cand1.5 ° Cglobal warming for individual ensemble members and ensemble mean. ( a ) Change in annual daily maximum temperature; ( b ) percentage of days with maximum temperature above 90th percentile for 1981-2010; ( c ) change in consecutive dry days; ( d ) change in annual maximum 5-day rainfall.\nFor precipitation, generally similar changes are seen at 1.5°C global warming as at 2°C, but smaller in magnitude (compare figures 16 and 4), suggesting that most of these changes are a response to radiatively forced climate change as opposed to internal climate variability. However, some localized changes do vary in sign between the GWLs, such as in South Australia, suggesting a possible dominance of internal variability over the global warming signal in these places.\nWhere Rx5day increases, the increases are projected to be larger-in some cases approximately double-at 2°C global warming than 1.5°C. Where Rx5day decreases, again the decreases are projected to be larger at 2°C global warming than 1.5°C (figure 17).", - "page_start": 16, - "page_end": 17, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "What is a formal fallacy ?", - "target_page": 8, - "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Fallacies\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually referred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw with the reasoning leading to this conclusion. [84] So the argument \"it is sunny today; therefore spiders have eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, give a more restrictive definition of fallacies by additionally requiring that they appear to be correct. [85] This way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. This explains why people tend to commit fallacies: because they have an alluring element that seduces people into committing and accepting them. [86] However, this reference to appearances is controversial because it belongs to the field of psychology, not logic, and because appearances may be different for different people. [87]\nFallacies are usually divided into formal and informal fallacies. [38] For formal fallacies, the source of the error is found in the form of the argument. For example, denying the antecedent is one type of formal fallacy, as in \"if Othello is a bachelor, then he is male; Othello is not a bachelor; therefore Othello is not male\". [88] But most fallacies fall into the category of informal fallacies, of which a great variety is discussed in the academic literature. The source of their error is usually found in the content or the context of the argument. [89] Informal fallacies are sometimes categorized as fallacies of ambiguity, fallacies of presumption, or fallacies of relevance. For fallacies of ambiguity, the ambiguity and vagueness of natural language are\nYoung America's dilemma: Shall I be wise and great, or rich and powerful? (poster from 1901) This is an example of a false dilemma: an informal fallacy using a disjunctive premise that excludes viable alternatives.\nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot be dark\". [90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise. [91] In the case of fallacies of relevance, the premises do not support the conclusion because they are not relevant to it. [92]", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Informal logic\nA further approach is to define informal logic as the study of informal fallacies. [37] Informal fallacies are incorrect arguments in which errors are present in the content and the context of the argument. [38] A false dilemma, for example, involves an error of content by excluding viable options. This is the case in the fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some theorists state that formal logic studies the general form of arguments while informal logic studies particular instances of arguments. Another approach is to hold that formal logic only considers the role of\nlogical constants for correct inferences while informal logic also takes the meaning of substantive concepts into account. Further approaches focus on the discussion of logical topics with or without formal devices and on the role of epistemology for the assessment of arguments. [40]", - "page_start": 2, - "page_end": 3, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Informal logic\nFormal logic needs to translate natural language arguments into a formal language, like first-order logic, to assess whether they are valid. In this example, the letter \"c\" represents Carmen while the letters \"M\" and \"T\" stand for \"Mexican\" and \"teacher\". The symbol \" ∧ \" has the meaning of \"and\".\nWhen understood in a wide sense, logic encompasses both formal and informal logic. [24] Informal logic uses non-formal criteria and standards to analyze and assess the correctness of arguments. Its main focus is on everyday discourse. [25] Its development was prompted by difficulties in applying the insights of formal logic to natural language arguments. [26] In this regard, it considers problems that formal logic on its own is unable to address. [27] Both provide criteria for assessing the correctness of arguments and distinguishing them from fallacies. [28]\nMany characterizations of informal logic have been suggested but there is no general agreement on its precise definition. [29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the language used to express arguments. On this view, informal logic studies arguments that are in informal or natural language. [30] Formal logic can only examine them indirectly by translating them first into a formal language while informal logic investigates them in their original form. [31] On this view, the argument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is examined by informal logic. But the formal translation \"(1) ; (2) ; (3) \" is studied by formal logic. [32] The study of natural language arguments comes with various difficulties. For example, natural language expressions are often ambiguous, vague, and context-dependent. [33] Another approach defines informal logic in a wide sense as the normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes questions about the role of rationality, critical thinking, and the psychology of argumentation. [34]\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way, it contrasts with deductive reasoning examined by formal logic. [35] Non-deductive arguments make their conclusion probable but do not ensure that it is true. An example is the inductive argument from the empirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are black\". [36]", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Arguments and inferences\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness. [59] An argument is a set of premises together with a conclusion. [60] An inference is the process of reasoning from these premises to the conclusion. [43] But these terms are often used interchangeably in logic. Arguments are correct or incorrect depending on whether their premises support their conclusion. Premises and conclusions, on the other hand, are true or false depending on whether they are in accord with reality. In formal logic, a sound argument is an argument that is both correct and has only true premises. [61] Sometimes a distinction is made between simple and complex arguments. A complex\nargument is made up of a chain of simple arguments. This means that the conclusion of one argument acts as a premise of later arguments. For a complex argument to be successful, each link of the chain has to be successful. [43]\nArguments and inferences are either correct or incorrect. If they are correct then their premises support their conclusion. In the incorrect case, this support is missing. It can take different forms corresponding to the different types of reasoning. [62] The strongest form of support corresponds to deductive reasoning. But even arguments that are not deductively valid may still be good arguments because their premises offer nondeductive support to their conclusions. For such cases, the term ampliative or inductive reasoning is used. [63] Deductive arguments are associated with formal logic in contrast to the\nArgument terminology used in logic\nrelation between ampliative arguments and informal logic. [64]", - "page_start": 4, - "page_end": 5, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Definition\nThe word \"logic\" originates from the Greek word logos , which has a variety of translations, such as reason, discourse, or language. [4] Logic is traditionally defined as the study of the laws of thought or correct reasoning, [5] and is usually understood in terms of inferences or arguments. Reasoning is the activity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a set of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. whether their premises support the conclusion. [7] These general characterizations apply to logic in the widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the correctness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict logic to formal logic. [9]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Formal logic\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal approach to study reasoning: it replaces concrete expressions with abstract symbols to examine the logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is only concerned with the abstract structure of arguments and not with their concrete content. [10]\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures the truth of their conclusion. This means that it is impossible for the premises to be true and the conclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion follows a pattern called a rule of inference. [12] For example, modus ponens is a rule of inference according to which all arguments of the form \"(1) p , (2) if p then q , (3) therefore q \" are valid, independent of what the terms p and q stand for. [13] In this sense, formal logic can be defined as the science of valid inferences. An alternative definition sees logic as the study of logical truths. [14] A proposition is logically true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is not\". [15] These two definitions of formal logic are not identical, but they are closely related. For example, if the inference from p to q is deductively valid then the claim \"if p then q \" is a logical truth. [16]\nFormal logic uses formal languages to express and analyze arguments. [17] They normally have a very limited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to construct sentences, so-called well-formed formulas. [18] This simplicity and exactness of formal logic make it capable of formulating precise rules of inference. They determine whether a given argument is valid. [19] Because of the reliance on formal language, natural language arguments cannot be studied directly. Instead, they need to be translated into formal language before their validity can be assessed. [20]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Informal\nThe epistemic approach to informal logic, on the other hand, focuses on the epistemic role of arguments. [148] It is based on the idea that arguments aim to increase our knowledge. They achieve this by linking justified beliefs to beliefs that are not yet justified. [149] Correct arguments succeed at expanding knowledge while fallacies are epistemic failures: they do not justify the belief in their conclusion. [150] For example, the fallacy of begging the question is a fallacy because it fails to provide independent justification for its conclusion, even though it is deductively valid. [151] In this sense, logical normativity consists in epistemic success or rationality. [149] The Bayesian approach is one example of an epistemic approach. [152] Central to Bayesianism is not just whether the agent believes something but the degree to which they believe it, the so-called credence . Degrees of belief are seen as subjective probabilities in the believed proposition, i.e. how certain the agent is that the proposition is true. [153] On this view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new\nincoming information. [154] Correct reasoning and the arguments it is based on follow the laws of probability, for example, the principle of conditionalization. Bad or irrational reasoning, on the other hand, violates these laws. [155]", - "page_start": 12, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Informal\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like investigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some frameworks of informal logic have also been presented that try to provide a systematic characterization of the correctness of arguments. [141]\nThe pragmatic or dialogical approach to informal logic sees arguments as speech acts and not merely as a set of premises together with a conclusion. [142] As speech acts, they occur in a certain context, like a dialogue, which affects the standards of right and wrong arguments. [143] A prominent version by Douglas N. Walton understands a dialogue as a game between two players. The initial position of each player is characterized by the propositions to which they are committed and the conclusion they intend to prove. Dialogues are games of persuasion: each player has the goal of convincing the opponent of their own conclusion. [144] This is achieved by making arguments: arguments are the moves of the game. [145] They affect to which propositions the players are committed. A winning move is a successful argument that takes the opponent's commitments as premises and shows how one's own conclusion follows from them. This is usually not possible straight away. For this reason, it is normally necessary to formulate a sequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's intended conclusion. Besides these positive arguments leading one closer to victory, there are also negative arguments preventing the opponent's victory by denying their conclusion. [144] Whether an argument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other hand, are violations of the standards of proper argumentative rules. [146] These standards also depend on the type of dialogue. For example, the standards governing the scientific discourse differ from the standards in business negotiations. [147]", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nLogic is the study of correct reasoning. It includes both formal and informal logic. Formal logic is the study of deductively valid inferences or logical truths. It examines how conclusions follow from premises based on the structure of arguments alone, independent of their topic and content. Informal logic is associated with informal fallacies, critical thinking, and argumentation theory. Informal logic examines arguments expressed in natural language whereas formal logic uses formal language. When used as a countable noun, the term \"a logic\" refers to a specific logical formal system that articulates a proof system. Logic plays a central role in many fields, such as philosophy, mathematics, computer science, and linguistics.\nLogic studies valid forms of inference like modus ponens .\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the argument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the conclusion \"I don't have to work\". [1] Premises and conclusions express propositions or claims that can be true or false. An important feature of propositions is their internal structure. For example, complex propositions are made up of simpler propositions linked by logical vocabulary like (and) or (if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a proposition usually depends on the meanings of all of its parts. However, this is not the case for logically true propositions. They are true only because of their logical structure independent of the specific meanings of the individual parts.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nArguments can be either correct or incorrect. An argument is correct if its premises support its conclusion. Deductive arguments have the strongest form of support: if their premises are true then their conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new information not found in the premises. Many arguments in everyday discourse and the sciences are ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are statistical generalization-such as inferring that all ravens are black, based on many individual observations of black ravens. [2] Abductive arguments are inferences to the best explanation-for example, when a doctor concludes that a patient has a certain disease, as the best explanation for the symptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the correctness of arguments.\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the main system of logic in the Western world until it was replaced by modern formal logic, which has its roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic only considers logical relations between full propositions. First-order logic also takes the internal parts of\npropositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant logics, on the other hand, reject certain classical intuitions and provide alternative explanations of the basic laws of logic.", - "page_start": 0, - "page_end": 1, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "In early Chinese philosophy, what were the major influences regarding the philosophy of logic ?", - "target_page": 18, - "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Philosophy of logic and philosophical logic\nPhilosophy of logic is the philosophical discipline studying the scope and nature of logic. [59] It examines many presuppositions implicit in logic, like how to define its basic concepts or the metaphysical assumptions associated with them. [158] It is also concerned with how to classify logical systems and considers the ontological commitments they incur. [159] Philosophical logic is one of the areas within the philosophy of logic. It studies the application of logical methods to philosophical problems in fields like metaphysics, ethics, and epistemology. [160] This application usually happens in the form of extended or deviant logical systems. [161]", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "History\nDuring the Middle Ages, many translations and interpretations of Aristotelian logic were made. The works of Boethius were particularly influential. Besides translating Aristotle's work into Latin, he also produced textbooks on logic. [195] Later, the works of Islamic philosophers such as Ibn Sina and Ibn Rushd (Averroes) were drawn on. This expanded the range of ancient works available to medieval Christian scholars since more Greek work was available to Muslim scholars that had been preserved in Latin commentaries. In 1323, William of Ockham's influential Summa Logicae was released. It is a comprehensive treatise on logic that discusses many basic concepts of logic and provides a systematic exposition of types of propositions and their truth conditions. [196]\nIn Chinese philosophy, the School of Names and Mohism were particularly influential. The School of Names focused on the use of language and on paradoxes. For example, Gongsun Long proposed the white horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism also acknowledged the importance of language for logic and tried to relate the ideas in these fields to the realm of ethics. [197]\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It was not treated as a separate academic discipline and discussions of its topics usually happened in the context of epistemology and theories of dialogue or argumentation. [198] In Nyaya, inference is understood as a source of knowledge (pramā ṇ a). It follows the perception of an object and tries to arrive at conclusions, for example, about the cause of this object. [199] A similar emphasis on the relation to epistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the knowledge gained through other sources. [200] Some of the later theories of Nyaya, belonging to the Navya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense and reference and his definition of number. [201]", - "page_start": 16, - "page_end": 17, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Classical\nClassical logic is distinct from traditional or Aristotelian logic. It encompasses propositional logic and first-order logic. It is \"classical\" in the sense that it is based on basic logical intuitions shared by most logicians. [117] These intuitions include the law of excluded middle, the double negation elimination, the principle of explosion, and the bivalence of truth. [118] It was originally developed to analyze mathematical arguments and was only later applied to other fields as well. Because of this focus on\nmathematics, it does not include logical vocabulary relevant to many other topics of philosophical importance. Examples of concepts it overlooks are the contrast between necessity and possibility and the problem of ethical obligation and permission. Similarly, it does not address the relations between past, present, and future. [119] Such issues are addressed by extended logics. They build on the basic intuitions of classical logic and expand it by introducing new logical vocabulary. This way, the exact logical approach is applied to fields like ethics or epistemology that lie beyond the scope of mathematics. [120]", - "page_start": 9, - "page_end": 10, - "source_file": "wikipedia1.pdf" - }, - { - "text": "History\nThe syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when interest in the foundations of mathematics stimulated the development of modern symbolic logic. [202] Many see Gottlob Frege's Begriffsschrift as the birthplace of modern logic. Gottfried Wilhelm Leibniz's idea of a universal formal language is often considered a forerunner. Other pioneers were George Boole, who invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the logic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these insights in their work Principia Mathematica . Modern logic introduced novel concepts, such as functions, quantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language to precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on natural language. [203] Of particular influence was the development of first-order logic, which is usually treated as the standard system of modern logic. [204] Its analytical generality allowed the formalization of mathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model theory possible and provided the foundation of modern mathematical logic. [205]", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia1.pdf" - }, - { - "text": "History\nLogic was developed independently in several cultures during antiquity. One major early contributor was Aristotle, who developed term logic in his Organon and Prior Analytics . [183] He was responsible for the introduction of the hypothetical syllogism [184] and temporal modal logic. [185] Further innovations include inductive logic [186] as well as the discussion of new logical concepts such as terms, predicables, syllogisms, and propositions. Aristotelian logic was highly regarded in classical and medieval times, both in Europe and the Middle East. It remained in wide use in the West until the early 19th century. [187] It has now been superseded by later work, though many of its key insights are still present in modern systems of logic. [188]\nIbn Sina (Avicenna) was the founder of Avicennian logic, which replaced Aristotelian logic as the dominant system of logic in the Islamic world. [189] It influenced Western medieval writers such as Albertus Magnus and William of Ockham. [190] Ibn Sina wrote on the hypothetical syllogism [191] and on the propositional calculus. [192] He developed an original \"temporally modalized\" syllogistic theory, involving temporal logic and modal logic. [193] He also made use of inductive logic, such as his methods of agreement, difference, and concomitant variation, which are critical to the scientific method. [191] Fakhr al-Din al-Razi was another influential Muslim logician. He criticized Aristotelian syllogistics and formulated an early system of inductive logic, foreshadowing the system of inductive logic developed by John Stuart Mill. [194]", - "page_start": 15, - "page_end": 16, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nArguments can be either correct or incorrect. An argument is correct if its premises support its conclusion. Deductive arguments have the strongest form of support: if their premises are true then their conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new information not found in the premises. Many arguments in everyday discourse and the sciences are ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are statistical generalization-such as inferring that all ravens are black, based on many individual observations of black ravens. [2] Abductive arguments are inferences to the best explanation-for example, when a doctor concludes that a patient has a certain disease, as the best explanation for the symptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the correctness of arguments.\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the main system of logic in the Western world until it was replaced by modern formal logic, which has its roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic only considers logical relations between full propositions. First-order logic also takes the internal parts of\npropositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant logics, on the other hand, reject certain classical intuitions and provide alternative explanations of the basic laws of logic.", - "page_start": 0, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Epistemology of logic\nThe epistemology of logic studies how one knows that an argument is valid or that a proposition is logically true. [174] This includes questions like how to justify that modus ponens is a valid rule of inference or that contradictions are false. [175] The traditionally dominant view is that this form of logical understanding belongs to knowledge a priori. [176] In this regard, it\nConjunction (AND) is one of the basic operations of Boolean logic. It can be electronically implemented in several ways, for example, by using two transistors.\nis often argued that the mind has a special faculty to examine relations between pure ideas and that this faculty is also responsible for apprehending logical truths. [177] A similar approach understands the rules of logic in terms of linguistic conventions. On this view, the laws of logic are trivial since they are true by definition: they just express the meanings of the logical vocabulary. [178]\nSome theorists, like Hilary Putnam and Penelope Maddy, object to the view that logic is knowable a priori. They hold instead that logical truths depend on the empirical world. This is usually combined with the claim that the laws of logic express universal regularities found in the structural features of the world. According to this view, they may be explored by studying general patterns of the fundamental sciences. For example, it has been argued that certain insights of quantum mechanics refute the principle of distributivity in classical logic, which states that the formula is equivalent to . This claim can be used as an empirical argument for the thesis that quantum logic is the correct logical system and should replace classical logic. [179]", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia1.pdf" - }, - { - "text": "See also\nGlossary of logic\nOutline of logic - Overview of and topical guide to logic\nCritical thinking - Analysis of facts to form a judgment\nList of logic journals\nList of logic symbols - List of symbols used to express logical relations\nList of logicians\nLogic puzzle - Puzzle deriving from the mathematics field of deduction\nLogical reasoning - Process of drawing correct inferences\nLogos - Concept in philosophy, religion, rhetoric, and psychology\nVector logic", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Philosophy\nPhilosophical debates have historically sought to determine the nature of intelligence and how to make intelligent machines. [356] Another major focus has been whether machines can be conscious, and the associated ethical implications. [357] Many other topics in philosophy are relevant to AI, such as epistemology and free will. [358] Rapid advancements have intensified public discussions on the philosophy and ethics of AI. [357]", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Systems of logic\nSystems of logic are theoretical frameworks for assessing the correctness of reasoning and arguments. For over two thousand years, Aristotelian logic was treated as the canon of logic in the Western world, [104] but modern developments in this field have led to a vast proliferation of logical systems. [105] One prominent categorization divides modern formal logical systems into classical logic, extended logics, and deviant logics. [106]", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "What is considered a deductively valid argument regarding logic ?", - "target_page": 6, - "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Arguments and inferences\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness. [59] An argument is a set of premises together with a conclusion. [60] An inference is the process of reasoning from these premises to the conclusion. [43] But these terms are often used interchangeably in logic. Arguments are correct or incorrect depending on whether their premises support their conclusion. Premises and conclusions, on the other hand, are true or false depending on whether they are in accord with reality. In formal logic, a sound argument is an argument that is both correct and has only true premises. [61] Sometimes a distinction is made between simple and complex arguments. A complex\nargument is made up of a chain of simple arguments. This means that the conclusion of one argument acts as a premise of later arguments. For a complex argument to be successful, each link of the chain has to be successful. [43]\nArguments and inferences are either correct or incorrect. If they are correct then their premises support their conclusion. In the incorrect case, this support is missing. It can take different forms corresponding to the different types of reasoning. [62] The strongest form of support corresponds to deductive reasoning. But even arguments that are not deductively valid may still be good arguments because their premises offer nondeductive support to their conclusions. For such cases, the term ampliative or inductive reasoning is used. [63] Deductive arguments are associated with formal logic in contrast to the\nArgument terminology used in logic\nrelation between ampliative arguments and informal logic. [64]", - "page_start": 4, - "page_end": 5, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nArguments can be either correct or incorrect. An argument is correct if its premises support its conclusion. Deductive arguments have the strongest form of support: if their premises are true then their conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new information not found in the premises. Many arguments in everyday discourse and the sciences are ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are statistical generalization-such as inferring that all ravens are black, based on many individual observations of black ravens. [2] Abductive arguments are inferences to the best explanation-for example, when a doctor concludes that a patient has a certain disease, as the best explanation for the symptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the correctness of arguments.\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the main system of logic in the Western world until it was replaced by modern formal logic, which has its roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic only considers logical relations between full propositions. First-order logic also takes the internal parts of\npropositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant logics, on the other hand, reject certain classical intuitions and provide alternative explanations of the basic laws of logic.", - "page_start": 0, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Formal logic\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal approach to study reasoning: it replaces concrete expressions with abstract symbols to examine the logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is only concerned with the abstract structure of arguments and not with their concrete content. [10]\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures the truth of their conclusion. This means that it is impossible for the premises to be true and the conclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion follows a pattern called a rule of inference. [12] For example, modus ponens is a rule of inference according to which all arguments of the form \"(1) p , (2) if p then q , (3) therefore q \" are valid, independent of what the terms p and q stand for. [13] In this sense, formal logic can be defined as the science of valid inferences. An alternative definition sees logic as the study of logical truths. [14] A proposition is logically true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is not\". [15] These two definitions of formal logic are not identical, but they are closely related. For example, if the inference from p to q is deductively valid then the claim \"if p then q \" is a logical truth. [16]\nFormal logic uses formal languages to express and analyze arguments. [17] They normally have a very limited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to construct sentences, so-called well-formed formulas. [18] This simplicity and exactness of formal logic make it capable of formulating precise rules of inference. They determine whether a given argument is valid. [19] Because of the reliance on formal language, natural language arguments cannot be studied directly. Instead, they need to be translated into formal language before their validity can be assessed. [20]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nLogic is the study of correct reasoning. It includes both formal and informal logic. Formal logic is the study of deductively valid inferences or logical truths. It examines how conclusions follow from premises based on the structure of arguments alone, independent of their topic and content. Informal logic is associated with informal fallacies, critical thinking, and argumentation theory. Informal logic examines arguments expressed in natural language whereas formal logic uses formal language. When used as a countable noun, the term \"a logic\" refers to a specific logical formal system that articulates a proof system. Logic plays a central role in many fields, such as philosophy, mathematics, computer science, and linguistics.\nLogic studies valid forms of inference like modus ponens .\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the argument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the conclusion \"I don't have to work\". [1] Premises and conclusions express propositions or claims that can be true or false. An important feature of propositions is their internal structure. For example, complex propositions are made up of simpler propositions linked by logical vocabulary like (and) or (if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a proposition usually depends on the meanings of all of its parts. However, this is not the case for logically true propositions. They are true only because of their logical structure independent of the specific meanings of the individual parts.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Definition\nThe word \"logic\" originates from the Greek word logos , which has a variety of translations, such as reason, discourse, or language. [4] Logic is traditionally defined as the study of the laws of thought or correct reasoning, [5] and is usually understood in terms of inferences or arguments. Reasoning is the activity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a set of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. whether their premises support the conclusion. [7] These general characterizations apply to logic in the widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the correctness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict logic to formal logic. [9]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Epistemology of logic\nThe epistemology of logic studies how one knows that an argument is valid or that a proposition is logically true. [174] This includes questions like how to justify that modus ponens is a valid rule of inference or that contradictions are false. [175] The traditionally dominant view is that this form of logical understanding belongs to knowledge a priori. [176] In this regard, it\nConjunction (AND) is one of the basic operations of Boolean logic. It can be electronically implemented in several ways, for example, by using two transistors.\nis often argued that the mind has a special faculty to examine relations between pure ideas and that this faculty is also responsible for apprehending logical truths. [177] A similar approach understands the rules of logic in terms of linguistic conventions. On this view, the laws of logic are trivial since they are true by definition: they just express the meanings of the logical vocabulary. [178]\nSome theorists, like Hilary Putnam and Penelope Maddy, object to the view that logic is knowable a priori. They hold instead that logical truths depend on the empirical world. This is usually combined with the claim that the laws of logic express universal regularities found in the structural features of the world. According to this view, they may be explored by studying general patterns of the fundamental sciences. For example, it has been argued that certain insights of quantum mechanics refute the principle of distributivity in classical logic, which states that the formula is equivalent to . This claim can be used as an empirical argument for the thesis that quantum logic is the correct logical system and should replace classical logic. [179]", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Informal logic\nFormal logic needs to translate natural language arguments into a formal language, like first-order logic, to assess whether they are valid. In this example, the letter \"c\" represents Carmen while the letters \"M\" and \"T\" stand for \"Mexican\" and \"teacher\". The symbol \" ∧ \" has the meaning of \"and\".\nWhen understood in a wide sense, logic encompasses both formal and informal logic. [24] Informal logic uses non-formal criteria and standards to analyze and assess the correctness of arguments. Its main focus is on everyday discourse. [25] Its development was prompted by difficulties in applying the insights of formal logic to natural language arguments. [26] In this regard, it considers problems that formal logic on its own is unable to address. [27] Both provide criteria for assessing the correctness of arguments and distinguishing them from fallacies. [28]\nMany characterizations of informal logic have been suggested but there is no general agreement on its precise definition. [29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the language used to express arguments. On this view, informal logic studies arguments that are in informal or natural language. [30] Formal logic can only examine them indirectly by translating them first into a formal language while informal logic investigates them in their original form. [31] On this view, the argument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is examined by informal logic. But the formal translation \"(1) ; (2) ; (3) \" is studied by formal logic. [32] The study of natural language arguments comes with various difficulties. For example, natural language expressions are often ambiguous, vague, and context-dependent. [33] Another approach defines informal logic in a wide sense as the normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes questions about the role of rationality, critical thinking, and the psychology of argumentation. [34]\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way, it contrasts with deductive reasoning examined by formal logic. [35] Non-deductive arguments make their conclusion probable but do not ensure that it is true. An example is the inductive argument from the empirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are black\". [36]", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Deductive\nA deductively valid argument is one whose premises guarantee the truth of its conclusion. [11] For instance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are frogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the conclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3) therefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises. [65]\nAccording to an influential view by Alfred Tarski, deductive arguments have three essential features: (1) they are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a priori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that they hold by logical necessity for the given propositions, independent of any other circumstances. [66]\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of inference. [67] Rules of inference specify the form of the premises and the conclusion: how they have to be structured for the inference to be valid. Arguments that do not follow any rule of inference are deductively invalid. [68] The modus ponens is a prominent rule of inference. It has the form \" p ; if p , then q ; therefore q \". [69] Knowing that it has just rained ( ) and that after rain the streets are wet ( ), one can use modus ponens to deduce that the streets are wet ( ). [70]\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is impossible for the premises to be true and the conclusion to be false. [71] Because of this feature, it is often asserted that deductive inferences are uninformative since the conclusion cannot arrive at new information not already present in the premises. [72] But this point is not always accepted since it would mean, for example, that most of mathematics is uninformative. A different characterization distinguishes", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Informal logic\nA further approach is to define informal logic as the study of informal fallacies. [37] Informal fallacies are incorrect arguments in which errors are present in the content and the context of the argument. [38] A false dilemma, for example, involves an error of content by excluding viable options. This is the case in the fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some theorists state that formal logic studies the general form of arguments while informal logic studies particular instances of arguments. Another approach is to hold that formal logic only considers the role of\nlogical constants for correct inferences while informal logic also takes the meaning of substantive concepts into account. Further approaches focus on the discussion of logical topics with or without formal devices and on the role of epistemology for the assessment of arguments. [40]", - "page_start": 2, - "page_end": 3, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nFormal logic is used for reasoning and knowledge representation. [78] Formal logic comes in two main forms: propositional logic (which operates on statements that are true or false and uses logical connectives such as \"and\", \"or\", \"not\" and \"implies\") [79] and predicate logic (which also operates on objects, predicates and relations and uses quantifiers such as \" Every X is a Y \" and \"There are some X s that are Y s\"). [80]\nIllustration of gradient descent for 3 different starting points; two parameters (represented by the plan coordinates) are adjusted in order to minimize the loss function (the height)\nDeductive reasoning in logic is the process of proving a new statement (conclusion) from other statements that are given and assumed to be true (the premises). [81] Proofs can be structured as proof trees, in which nodes are labelled by sentences, and children nodes are connected to parent nodes by inference rules.\nGiven a problem and a set of premises, problem-solving reduces to searching for a proof tree whose root node is labelled by a solution of the problem and whose leaf nodes are labelled by premises or axioms. In the case of Horn clauses, problem-solving search can be performed by reasoning forwards from the premises or backwards from the problem. [82] In the more general case of the clausal form of first-order logic, resolution is a single, axiom-free rule of inference, in which a problem is solved by proving a contradiction from premises that include the negation of the problem to be solved. [83]\nInference in both Horn clause logic and first-order logic is undecidable, and therefore intractable. However, backward reasoning with Horn clauses, which underpins computation in the logic programming language Prolog, is Turing complete. Moreover, its efficiency is competitive with computation in other symbolic programming languages. [84]\nFuzzy logic assigns a \"degree of truth\" between 0 and 1. It can therefore handle propositions that are vague and partially true. [85]\nNon-monotonic logics, including logic programming with negation as failure, are designed to handle default reasoning. [28] Other specialized versions of logic have been developed to describe many complex domains.", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "What was the mean correctness score for LLM-generated handoff notes ?", - "target_page": 7, - "target_passage": "Correctness 4.52", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Abstract\nIMPORTANCE An emergency medicine (EM) handoff note generated by a large language model (LLM) has the potential to reduce physician documentation burden without compromising the safety of EM-to-inpatient (IP) handoffs.\nOBJECTIVE To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and safety compared with physician-written notes.\nDESIGN, SETTING, AND PARTICIPANTS This cohort study used EM patient medical records with acute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical Center. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated EM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented understudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers score [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) and a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written notes were compared. Data were analyzed from October 2023 to March 2024.\nEXPOSURE LLM-generated EM handoff notes.\nMAINOUTCOMESANDMEASURES LLM-generated handoff notes were evaluated for (1) lexical similarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with respect to source notes using SCALE; and (3) readability, completeness, curation, correctness, usefulness, and implications for patient safety using a novel framework.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, pretrained LLM and rule-based approaches within an end user-developed note template. It is important to note that (largely due to time constraints within the EM care delivery model) the performance of EM-to-IP handoff notes was not the current standard of care in EM. The study site's unique electronic handoff process enabled a comparison between physician-written and LLM-generated handoff notes. Traditional automated evaluations of the model output suggested\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Introduction\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nevaluation frameworks may not address the anticipated effect LLM performance limitations could have on patient safety. 38-41\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate the outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care rendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP handoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in Supplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and unstructured EHR data from the ED encounter to summarize the patient's ED care. We improved the correctness of model generations and customized the summaries in a structured format designed by a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel patient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes' quality and accuracy and the downstream patient safety implications of any identified inaccuracies. To evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting physician-written EM-to-IP handoff notes as the active control, using both the proposed patient safety-focused clinical evaluation framework and automated benchmark-driven methods. We used the physician-written EM-to-IP handoff notes as the active control and used the scores from both evaluation frameworks for the margin of inferiority of the intervention.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "KeyPoints\nQuestion Can a large language model (LLM) generate emergency medicine (EM)-to-inpatient (IP) handoff notes that are useful and safe for EM care?\nFindings In this cohort study of 1600 EMpatient medical records using a novel evaluation framework, the LLM-generated EM-to-IP handoff notes had a mean usefulness of 4.04 out of 5 (compared with 4.36 for physician-written) and a mean patient safety of 4.06 out of 5 (compared with 4.50 for physician-written) with no critical patient safety risks.\nMeaning These findings suggest the value of a manual, patient safetyfocused clinical evaluation of LLM models and the potential of LLM-generated handoff notes to create a new standard of care in EM.\n+\nInvited Commentary", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\n1-5, No. (%) a.5 = 140 (93.3). Correctness: hallucination, LLM-generated..Mean (SD) = 4.96 (0.14). Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.2 = 0. Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.3 = 0. Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.4 = 5 (3.3). Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.5 = 145 (96.7). Correctness: hallucination, Physician-written.Mean (SD).Mean (SD) = 5.00. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.3 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.4 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.5 = 150 (100). Correctness: knowledge gap, LLM-generated..Mean (SD) = 4.88 (0.48). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.2 = 3 (2). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\nscore 1-5, No. (%) a.1 = 0. Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.3 = 2 (1.3). Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.4 = 2 (1.3). Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.5 = 146 (97.3). Correctness: bias, LLM-generated..Mean (SD) = 5.00. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.2 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.3 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.4 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.5 = 150 (100). Correctness: bias, Physician-written.Mean (SD).Mean (SD) = 5.00. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.3 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.4 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.5 = 150 (100). Overall safety risk, LLM-generated..Mean (SD) = 4.06", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\na.3 = 2 (1.3). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.4 = 6 (4). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.5 = 139 (92.7). Correctness: knowledge gap, Physician-written.Mean (SD).Mean (SD) = 4.90 (0.42). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.2 = 1 (0.7). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.3 = 5 (3.3). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.4 = 3 (2). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.5 = 141 (94). Correctness: faulty logic, LLM-generated..Mean (SD) = 4.60 (0.75). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.2 = 11 (7.3). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.3 = 12 (8). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.4 = 13 (8.7). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.5 = 114 (76). Correctness: faulty logic, Physician-written.Mean (SD).Mean (SD) = 4.94 (0.24). Correctness: faulty logic, Physician-written.Likert", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\na Likert scores and score distributions over 50 notes for 3 annotators. There are no 1 ratings for either physician or LLM summaries in the 150 evaluation results.\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written\n1-5, No. (%) a.5 = 107 (71.3). Correctness, LLM-generated..Mean score (SD) = 4.52 (0.64). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Correctness, LLM-generated.Likert rating 1-5, No. (%) a.2 = 0. Correctness, LLM-generated.Likert rating 1-5, No. (%) a.3 = 13 (8.7). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.4 = 39 (26). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.5 = 98 (65.3). Correctness, Physician-written..Mean score (SD) = 4.90 (0.39). Correctness, Physician-written.Likert rating 1-5, No. (%) a.1 = 0. Correctness, Physician-written.Likert rating 1-5, No. (%) a.2 = 0. Correctness, Physician-written.Likert rating 1-5, No. (%) a.3 = 2 (1.3). Correctness, Physician-written.Likert rating 1-5, No. (%) a.4 = 12 (8). Correctness, Physician-written.Likert rating 1-5, No. (%) a.5 = 136 (90.7). Usefulness, LLM-generated..Mean score (SD) = 4.04 (0.86). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.2 = 12 (8). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.3 = 30 (20). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.4 = 59 (39.3). Usefulness,", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "What are the improvements made to possible to the HadGEM3 and CMIP5 climate change models by UKCP18 ?", - "target_page": 1, - "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "(a) Global climate simulations at 1.5 ° Cand2 ° Cglobalwarming\nThe high-resolution simulations were performed using the HadGEM3A Global Atmosphere (GA) 3.0 model [12-14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with gridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of the HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of climate models [12]. This represents the third generation of HadGEM configurations, leading on from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. Key improvements over the previous model, HadGEM2, include increased vertical levels in the atmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. This version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met Office is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution for seasonal and decadal forecasting and clear benefits are emerging from this use at higher resolution [18,19].", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "What is UKCP18 and why do we need it?\nFollowing the historic Paris Agreement on Climate Change in December 2015, the Department of Environment, Food and Rural Affairs announced a major upgrade to the UK Climate Projections.\nThe UKCP18 project will build upon the current set of projections (UKCP09) to provide the most up-todate assessment of how the climate of the UK may change over the 21st century. This information will be essential to future Climate Change Risk Assessments 1 and to equip the UK with information to help adapt to the challenges and opportunities of climate change in line with the National Adaptation Programme 2 .\nOrganisations and individual users will use UKCP18 to inform risk assessments and adaptation plans to ensure they are resilient to extreme weather and climate change. Some organisations will use UKCP18 in responding to the Adaptation Reporting Power 3 for example.", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "reporting-second-round-reports\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate change to be assessed consistently over larger study areas.\n5 http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3\n6 Coupled model intercomparison project phase 5, see http://cmip-pcmdi.llnl.gov/cmip5/\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, 5791-5806 (2012) http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "(a) Global climate simulations at 1.5 ° Cand2 ° Cglobalwarming\nThe SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with the RCP8.5 scenario from 1979 to 2100-the CMIP5 members were selected as representative of a range of outcomes for future climate change, including high and low climate sensitivity, different biases in baseline precipitation climatology, and different global patterns of precipitation change. Specific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global mean temperature in the original CMIP5 projections. The time of reaching a specific level of global warming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected, which means that the results here may be sensitive to systematic errors arising from biases in the present-day SST patterns.\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5 concentration scenario. Aerosol concentrations were calculated within the model, with aerosol emissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse gas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble\n4\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nTable 1. ClimPACT weather extremes indices.", - "page_start": 3, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "4. Discussion\nIn most cases, global mean changes at 2°C are larger than those at 1.5°C, not only for individual members but also for the ensemble as a whole. All ensemble members show increases in TXx at 2°C which are larger than all changes at 1.5°C, and same true for most other variables.\n22\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0\nFigure 20. Di/fference between 2 ° Cand1.5 ° C global warming in percentage changes in mean (top) run-o/ff in JULES simulations driven by the ensemble of HadGEM3 simulations. Note that the use of percentage changes emphasizes changes in regions where the baseline stream/flow is small.\nThe largest regional differences between 2°C and 1.5°C global warming tend to be in the regions where the local impact is largest relative to the baseline. For TXx this is generally the midlatitudes, whereas for TX90p it is generally the tropics. So, broadly, the impacts at 1.5°C global warming could be estimated by scaling-back the impacts at 2°C.\nThese results show some similarities with those from the CMIP5 models [9,38], but also some notable differences. The CMIP5 models were at lower spatial resolution than the models used here. Although the general patterns of change in TXx are broadly similar in our study and CMIP5, with greater warming in many continental interiors, is notable that our results show more marked geographical variation than those from CMIP5 projections ([9], among others), with the continental interior warming being more intense in our projections. In particular, our results with HadGEM3 show more intense increases in maximum temperature in North America and Europe.", - "page_start": 21, - "page_end": 22, - "source_file": "pubmed11.pdf" - }, - { - "text": "What can users expect from UKCP18?\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. These components are described below and summarised in Table 1. UKCP18 will provide each of these components at a higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "Sea level rise. Storm surge. Past event case studies.\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include an estimate of the year-to-year changes in sea level rise and a 'plausible but highly unlikely' scenario known as H++. A new feature of UKCP18 will be assessing the credibility of making sea level rise projections to 2300. The projections will use the latest information from the CMIP5 models and application of the methods used in the Intergovernmental Panel on Climate Change's (IPCC) Fifth Assessment Report 10 .\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change in high water levels over the 21st Century. These estimates will be based on a combination of projected mean sea level change and projections of change in the extremes due to changes in atmospheric storminess. These 'storminess' projections will use the same surge model used in operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to drive the surge. New understanding of the modification of large-scale sea level change signals as they pass from the open ocean onto the shelf sea around the UK will be incorporated into the UKCP18 marine projections. UKCP18 will also include storm surge historical case studies derived from applying plausible future sea level change to historical extreme events.\n8 The latest update can be found at http://www.metoffice.gov.uk/climate/uk/about/state-of-climate\n9 http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/\n10 https://www.ipcc.ch/report/ar5/", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nFigure 6. Simulated changes in the average length of /flood events (number of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in 1981-2010, at 2 ° C global warming, for individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify the driving CMIP5 model (or ensemble mean).\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nMIROC-ESM-CHEM\nFigure 7. Hunger and Climate Vulnerability Index calculated for simulated climate states at 2 ° C global warming for /five individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean.\nchange in length of average flood event (days)\n13\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0\nFigure 8. Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2 ° C globalwarming,for/five individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean.", - "page_start": 12, - "page_end": 13, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "Which causes of the rise of sea level will be considered by UKCP18 ?", - "target_page": 2, - "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Sea level rise. Storm surge. Past event case studies.\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include an estimate of the year-to-year changes in sea level rise and a 'plausible but highly unlikely' scenario known as H++. A new feature of UKCP18 will be assessing the credibility of making sea level rise projections to 2300. The projections will use the latest information from the CMIP5 models and application of the methods used in the Intergovernmental Panel on Climate Change's (IPCC) Fifth Assessment Report 10 .\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change in high water levels over the 21st Century. These estimates will be based on a combination of projected mean sea level change and projections of change in the extremes due to changes in atmospheric storminess. These 'storminess' projections will use the same surge model used in operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to drive the surge. New understanding of the modification of large-scale sea level change signals as they pass from the open ocean onto the shelf sea around the UK will be incorporated into the UKCP18 marine projections. UKCP18 will also include storm surge historical case studies derived from applying plausible future sea level change to historical extreme events.\n8 The latest update can be found at http://www.metoffice.gov.uk/climate/uk/about/state-of-climate\n9 http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/\n10 https://www.ipcc.ch/report/ar5/", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "What can users expect from UKCP18?\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. These components are described below and summarised in Table 1. UKCP18 will provide each of these components at a higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "What is UKCP18 and why do we need it?\nFollowing the historic Paris Agreement on Climate Change in December 2015, the Department of Environment, Food and Rural Affairs announced a major upgrade to the UK Climate Projections.\nThe UKCP18 project will build upon the current set of projections (UKCP09) to provide the most up-todate assessment of how the climate of the UK may change over the 21st century. This information will be essential to future Climate Change Risk Assessments 1 and to equip the UK with information to help adapt to the challenges and opportunities of climate change in line with the National Adaptation Programme 2 .\nOrganisations and individual users will use UKCP18 to inform risk assessments and adaptation plans to ensure they are resilient to extreme weather and climate change. Some organisations will use UKCP18 in responding to the Adaptation Reporting Power 3 for example.", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "Materials and methods\nFirstly, the period of 1986-2005 is de/fined as the baseline, of which the simulated average value is recognized as 0.61 °C above pre-industrial (the period of 1850-1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between di/fferent periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986-2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. /T_hirdly, the climate data of global warming by 1.5 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 1.5-2.0 °C above pre-industrial levels at the end of the twenty-/first century; the climate data of global warming by 2.0 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 2.0-2.5 °C above pre-industrial levels at the end of the twenty-/first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately con/firmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020-2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041-2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060-2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065-2084.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "I.5.2. Price revision index\nPrice revision is determined by the formula set out in Article II.20 and using the trend in the harmonised indices of consumer prices (HICP) 'Euro area (19 countries)' published at http://ec.europa.eu/eurostat/web/hicp/data/database under HICP (2015 = 100) - monthly data (index) (prc_hicp_midx).]", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n2 = 2032. ACCESS1-0, 1 = 2026. ACCESS1-0, 2 = 2040", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed11.pdf" - }, - { - "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nup to present-day plus model-projected warming thereafter (table 4). While this does lead to inconsistent definitions of dates of the GWLs for applications of the climate model output with and without bias correction, the focus here is on the level of warming relative to pre-industrial rather than the timing of this warming. Therefore, priority is given to an accurate quantification of GWLs in all parts of the study, at the expense of inconsistencies in the dates of these warming levels. The inconsistency between the dates of the GWLs ranged from 2 to 9 years depending on the model and warming level. This inconsistency would have consequences if these results were applied to time-dependent impacts and adaptation assessments, but that is not the case here so this concern does not apply. However, one issue is that the time-dependent nature of the aerosol forcing means that the spatial pattern of regional climate responses varies over time, so this will lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the HCVI and JULES impacts projections.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "1. Introduction\nThe public's distinct understanding of the cause and e GLYPH<11> ect of the global climate issue is an obstacle to joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], previous studies noticed that the public had even failed to reach an agreement on whether 'climate change' or 'global warming' is the most appropriate definition of the global climate concern [3-5]. According to the definition provided by [6], global warming describes global climate issues as a continuous increase in the average temperature of Earth's surface due to anthropogenic emissions of greenhouse gases, whereas climate change includes not only temperature rise but also a range of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062; doi:10.3390 / ijerph17031062\nwww.mdpi.com / journal / ijerph\n/gid00001\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n2 of 22\ncomplex changes in the state of the climate [7], which may be caused by natural process, external forces, or human interventions [8]. By randomly assigning respondents to climate change or global warming questionnaires, scholars confirmed that the di GLYPH<11> erent connotations contained in the two definitions are likely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which may inhibit collaboration and joint e GLYPH<11> orts to mitigate the global challenge.\nPublic preference between climate change and global warming is even more apparent when considering the ideology spectrum [10]. Some scholars concluded that conservatives, who are less concerned with environmental issues, tended to use global warming as a narrative strategy because global warming has a more direct connection with temperature rise, making it easier to find contradictory cues such as freezing weather or heavy snowstorms to deny global climate change facts [11]. The associations between global warming and human activities may contribute to more controversies as well [12], connecting global warming more with the 'hoax' frame [5] and evoking greater negative sentiment [13].", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "What perdiod is covered by the 12 km resolution projection data of the UKCP18 ?", - "target_page": 4, - "target_passage": "1981-2080", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "What can users expect from UKCP18?\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. These components are described below and summarised in Table 1. UKCP18 will provide each of these components at a higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "DOWNSCALED HIGH RESOLUTION PROJECTIONS\nDownscaled versions of the global model for the UK. For the most spatially detailed downscaling this includes hourly data. Simultaneous impacts captured at multiple UK locations.\nThe high resolution projections will provide information on types of weather of relevance to adaptation at two different resolutions. The 12 km model provides a downscaled product that is similar to UKCP09's 25 km simulations but driven by an improved global model and at a higher resolution. This may be especially useful for those interested in water availability and some aspects of agriculture. A key reason for providing this data is that users will be able to compare it directly with EURO-CORDEX 13 .\nThe global projections will also be downscaled to 2.2 km using a process of nesting models at finer resolution that maintains the integrity of the representation of evolving atmospheric processes. Key benefits of simulations at this resolution will be the information provided on high impact events such as localised heavy rainfall in summer and potential improvements in the diurnal cycle.\nThe output will be available at a time resolution of 3-hourly, possibly higher for some output, for a high emission scenario. Spatial coherence will be maintained. Specific time slices (e.g. 2061-2080) will be made available with the exact nature of these still to be confirmed.\n11 SRESA1B: IPCC future scenario based on rapid economic growth and a balance of energy sources\n12 30-year means can be created using the UKCP18 PDF data\n13 http://www.euro-cordex.net/", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "Summary of expected outputs\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\nCharacteristics, Observations (UK State of the Climate) = Observed trends; long-term climatologies; weather events for the preceding year. Characteristics, Marine and coastal projections = Updated sea level rise and surge projections based on operational storm surge model (CS3) using CMIP5, EURO-CORDEX‡. Characteristics, Land.Global projections = Ensemble of ~20 spatially coherent time series of the Met Office Hadley Centre model and a similar number of CMIP5 models. Characteristics, Land.Probabilistic projections = Updated probability density functions presented as 30- year and monthly time series based on Met Office models (HadCM3, ESPPE) and CMIP5. Characteristics, Land.High resolution projections = Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events. Characteristics, Land.High resolution projections = Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events. Scale, Observations (UK State of the Climate) = UK. Scale, Marine and coastal projections = UK. Scale, Land.Global projections = Global. Scale, Land.Probabilistic projections = UK. Scale, Land.High resolution projections = UK. Scale, Land.High resolution projections = UK. Spatial resolution*, Observations (UK State of the Climate) = To match land projections. Spatial resolution*, Marine and coastal projections = UK Coastline †. Spatial resolution*, Land.Global projections = 60km. Spatial resolution*, Land.Probabilistic projections = 25km. Spatial resolution*, Land.High resolution projections = 12km +. Spatial resolution*, Land.High resolution projections = 2.2km. Highest temporal resolution, Observations (UK State of the Climate) = Daily / monthly. Highest temporal resolution, Marine and coastal projections = Annual. Highest temporal resolution, Land.Global projections = Daily. Highest temporal resolution, Land.Probabilistic projections = Monthly. Highest temporal resolution, Land.High resolution projections = Daily. Highest temporal resolution, Land.High resolution projections = Sub-daily. Period of data, Observations (UK State of the Climate) = bulk of 20th century to present day. Period of data, Marine and coastal", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "Web viewing considerations\n/SM590000 For Line Data:\n- The line data applet supports annotations. It can work with large object (LOB) reports if the large object functionality is employed at load time.\n- The Ajax viewer and direct rendering capabilities of Content Navigator work only on shorter reports. Additionally, the viewing of annotations and large object documents is not supported.\n/SM590000 For AFP data:\n- The AFP plug-in is the best choice, because it is almost identical to the client. However, it does not support annotations.\nThe only viewers that use this functionality are the line data applet, the AFP plug-in viewer, and the Content Manager OnDemand Windows client.\n- AFP to PDF is a choice that does not require a plug-in rollout at the users' computers if the Acrobat plug-in is installed on their workstations. Font mappings must be configured at a central location. The additional workload on a rendering system and additional license costs must be considered. Large reports might not be able to be rendered or viewed.\nNote: The AFP viewer plug-in, which is available with ODWEK and Content Manager OnDemand, is a version of the AFP viewer plug-in from the InfoPrint Solutions Company. Although the standard InfoPrint viewer can be used for viewing AFP, the ODWEK version uses direct communication with the Content Manager OnDemand server, enabling segmented document transfer for LOB documents.", - "page_start": 212, - "page_end": 212, - "source_file": "sg246915.pdf" - }, - { - "text": "What is UKCP18 and why do we need it?\nFollowing the historic Paris Agreement on Climate Change in December 2015, the Department of Environment, Food and Rural Affairs announced a major upgrade to the UK Climate Projections.\nThe UKCP18 project will build upon the current set of projections (UKCP09) to provide the most up-todate assessment of how the climate of the UK may change over the 21st century. This information will be essential to future Climate Change Risk Assessments 1 and to equip the UK with information to help adapt to the challenges and opportunities of climate change in line with the National Adaptation Programme 2 .\nOrganisations and individual users will use UKCP18 to inform risk assessments and adaptation plans to ensure they are resilient to extreme weather and climate change. Some organisations will use UKCP18 in responding to the Adaptation Reporting Power 3 for example.", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "Annual report: State of the UK Climate. Downloadable data.\nThe 'State of the UK Climate' report for 2017 will be included as part of the UKCP18 package, bringing the observed data right up to date. This annual update 8 covers trends, the multidecade climate record and significant weather events such as the early July 2015 hot spell and the exceptionally mild and wet December of the same year.\nQuality controlled UK observational datasets from the Met Office observing network, provided at spatial resolutions to match the land projections and for pre-defined administrative regions and river basins, will be available under an Open Government Licence 9 . For variables such as temperature and precipitation these data sets will span the late 19th Century to the present day and will be provided for daily, monthly, seasonal, annual and long term averages.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "Windows client viewers\nThe Content Manager OnDemand Windows client contains native capabilities for viewing typical archive data types:\n/SM590000 Line Data and SCS\n/SM590000 AFP\n/SM590000 Images\nThe Windows client reflects the richest set of capabilities in terms of viewing these data types. Because it directly communicates with the Content Manager OnDemand server, we reference the Windows client for all of its features that relate to document display.\nThe Line Data viewer of the Windows client is the most sophisticated viewer that is available for Content Manager OnDemand from the selection of readily available viewers.\nThe viewing of these primary data types happens within the same application. The Windows client provides other features, such as thumbnails, and configurable and saveable views.\nThe Content Manager OnDemand Windows client also contains other capabilities for viewing archive data types, such as Portable Document Format ( PDF ) and User-Defined .\nStarting with Content Manager OnDemand version 9.5, for both DocType=PDF and user-defined PDF, the Windows Client will attempt to view a PDF document with Adobe Acrobat, if it is installed. If Adobe Acrobat is not installed, for DocType=PDF, Adobe Acrobat Reader will be used instead when the PDF document is viewed.\nBefore Content Manager OnDemand version 9.5, PDF documents can be viewed by the Windows client in two ways:\n/SM590000 If they are configured in the application as data type 'PDF', the rich feature set of the AFP and Line Data viewer applies, but Adobe Acrobat Professional is required.\n/SM590000 If the data type is configured as 'User Defined' and '. pdf ' as the extension, the documents are started externally. Therefore, you can view the documents with the no-charge Adobe Acrobat viewer or any other installed PDF viewer.\nAny data type can be specified as 'User Defined', for example, Word documents ( .docx ). User-defined data is viewed by invoking its associated application.", - "page_start": 210, - "page_end": 210, - "source_file": "sg246915.pdf" - }, - { - "text": "I.5.2. Price revision index\nPrice revision is determined by the formula set out in Article II.20 and using the trend in the harmonised indices of consumer prices (HICP) 'Euro area (19 countries)' published at http://ec.europa.eu/eurostat/web/hicp/data/database under HICP (2015 = 100) - monthly data (index) (prc_hicp_midx).]", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "13.4.4 Image data\nTo optimize performance with storing and retrieving image formats, such as Tagged Image File Format (TIFF), Graphics Interchange Format (GIF), and Joint Photographic Experts Group (JPEG), do not compress the data because the file sizes might increase. To turn off compression, select the Disable option from the Load Information tab within the application. See Figure 13-6.\nFigure 13-6 Disabling compression\nTwo methods are available to turn off data compression:\n/SM590000 Disable: Content Manager OnDemand does not compress the input data. Choose this option when the input data, such as PDF and compressed TIFFs, is already compressed. Documents are extracted by the appropriate viewer on the client (for example, Adobe Acrobat Reader).\n/SM590000 None: Content Manager OnDemand does not compress the input data when it loads the input data into the system. When the user selects a document for viewing, Content Manager OnDemand compresses the document before it transmits it over the network and extracts the document at the client.\n312\nIBM Content Manager OnDemand Guide\nPart\n4", - "page_start": 335, - "page_end": 336, - "source_file": "sg246915.pdf" - }, - { - "text": "25KM PROBABILISTIC PROJECTIONS\nCaptures natural variability and climate change . Updated models and observations. Provides seasonal scale projections.\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for estimating uncertainty for use in risk-based analysis. Probabilistic projections will be updated using an up-to-date collection of Met Office climate simulations and the latest IPCC-assessed simulations to estimate the model uncertainties, incorporate the latest observations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for the UK at monthly intervals for several emission scenarios, including one used in UKCP09 11 . The new probabilistic projections will indicate the range of uncertainty in our knowledge of the climate system and natural variability through the 21st century, using probability density functions to provide information on how climate varies from month to month. This contrasts with UKCP09 for which only 30-year means were provided 12 .", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "How many articles compose the Syntec French collective bargaining agreement ?", - "target_page": 2, - "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3.1.1 Syntec (Retrieval)\nThe Syntec French collective bargaining agreement 3 comprises around 90 articles. Despite its topic, the language used does not feature the specificity of the legal vocabulary, making the data suitable for benchmarking general-purpose models. The articles have been scraped for use as documents. Four annotators were divided into two groups. Each group was given half of the articles and asked to choose an article and write a question about it. Each annotator wrote 25 questions. Thus, a hundred questions have been manually created and paired with the articles containing the answer 4 . Examples of the dataset are available in the appendix Figure 5. This dataset could also be used for text classification, clustering or topic modeling. Regarding quality checks, every article's integrity has been reviewed while manually creating questions. We also manually checked that the questions could only be answered using the annotated article.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv4.pdf" - }, - { - "text": "Query\nFigure 5: Extracts of Syntec dataset.", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.\nSamples, Syntec = 100 queries. Samples, HAL = 26233 samples. Samples, SummEvalFr = 100 texts. , Syntec = 90 documents. , HAL = 10 classes. , SummEvalFr = 1100 human summaries. Creation process Annotation process, Syntec = Scraping of Syntec col- lective bargaining agree- ment with articles as doc- uments. Writing queries corresponding to articles. 4 annotators divided into. Creation process Annotation process, HAL = Scraping of HAL arti- cles with id , title and do- main . Further cleaning with deduplication, lan- guage filtering and class subsampling. Annotations provided by. Creation process Annotation process, SummEvalFr = 1600 machine summaries Translation from English to French with Deepl of the SummEval dataset. Detailed annotation pro-. Quality checks, Syntec = wrote 25 questions. Human verification of an- notations.. Quality checks, HAL = Baseline models for clas- sification and topic model- ing.. Quality checks, SummEvalFr = Correlation between BLEU and ROUGE scores of the French and the original English datasets. LLM as-a-judge translation rating and human verification.", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "Query\nFigure 5: Extracts of Syntec dataset.\nquestion, article-14 = . question, = Quel est le préavis en période", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\nHyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields. Scrapping this resource, we fetched 85,000 publications in French 5 . We extracted IDs, titles and the author's choice among domain labels. The last 2 are provided by authors when submitting their papers to HAL. Since domain annotations are provided, the dataset can be used for many tasks, such as topic modeling or text classification. To ensure the dataset quality is suitable for a benchmark, further data cleaning has been performed:\n· Duplicates are eliminated, retaining unique publications for each field.\n· Irrelevant titles (due to API indexing mistakes) or titles in languages other than French have been manually removed.\n3 https://www.syntec.fr/convention-collective/\n4 https://huggingface.co./datasets/lyon-nlp/ mteb-fr-retrieval-syntec-s2p\n5 https://huggingface.co./datasets/lyon-nlp/ clustering-hal-s2s\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.", - "page_start": 1, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "Employees\nAs of December 31, 2004, we employed approximately 13,400 full-time employees, approximately 3,100 of whom were covered by collective bargaining agreements. Our management believes that we have good relations with our employees.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nTotals = 7,620. (65), Eliminating Entries = (1,196). (65), Consolidated Totals Consolidated = 6,424. $ (13 (13), Long Distance = $ 4. $ (13 (13), Network = $ 4. $ (13 (13), Shen Comm = $ 1. $ (13 (13), PCS = $ (76). $ (13 (13), Combined Totals = $ 4,023. $ (13 (13), Eliminating Entries = $ (3,633). $ (13 (13), Consolidated Totals Consolidated = $ 390. 5, Long Distance = 4. 5, Network = 10 - -. 5, Shen Comm = 8 -. 5, PCS = (91) 50. 5, Combined Totals = 4,313. 5, Eliminating Entries = (4,454). 5, Consolidated Totals Consolidated = (141). 92, Long Distance = 2. 92, Network = . 92, Shen Comm = . 92, PCS = . 92, Combined Totals = 4,391. 92, Eliminating Entries = (4,110). 92, Consolidated Totals Consolidated = 265. $ 26, Long Distance = $ - -. $ 26, Network = $ - -. $ 26, Shen Comm = $ -. $ 26, PCS = $ 2,920. $ 26, Combined Totals = $ 7,144. $ 26, Eliminating Entries = $ (3,634). $ 26, Consolidated Totals Consolidated = $ 3,510. 6, Long Distance = -. 6, Network = - -. 6, Shen Comm = -. 6, PCS = 3,693. 6, Combined Totals = 8,649. 6, Eliminating Entries = (4,454). 6, Consolidated Totals Consolidated = 4,195. 87, Long Distance = - - -. 87, Network = - -. 87, Shen Comm = -. 87, PCS = 3,131. 87, Combined Totals = 8,237. 87, Eliminating Entries = (4,110). 87, Consolidated Totals Consolidated = 4,127. $ 377, Long Distance = $ 157. $ 377, Network = $ 242. $ 377, Shen Comm = $ (7). $ 377, PCS = $ (411). $ 377, Combined", - "page_start": 38, - "page_end": 38, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Document\nurl, article-14 = https://www.syntec.fr/convention- collective/resiliation-du-contrat- de-travail/#article-14. title, article-14 = Article 14 : Préavis pendant la péri- ode d'essai. section, article-14 = Résiliation du contrat de travail. content, article-14 = Modification Avenant n° 7 du 5/07/1991 Au cours de cette péri- ode, les deux parties peuvent se sé- parer avec un préavis d'une journée de travail pendant le premier mois. Après le premier mois, le temps de préavis réciproque sera d'une semaine par mois complet passé dans l'entreprise. Après le pre- mier mois, le temps de préavis ré- ciproque sera d'une semaine par mois passé dans l'entreprise. Le préavis donne droit au salarié de s'absenter pour la recherche d'un emploi dans les conditions fixées à", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "6.1 Foundation, legislation, compliance and supervision\nThe ethical and economic importance of safe and healthy working conditions led to an integration of this target in international conventions and agreements; it is also embedded in the treaties of the EU.\nUN has included 'Safe and secure work environment' as an indicator for Goal 8 of their 17 global 'Sustainable Development Goals ' for 2030. Goal 8 aims to 'Promote sustained, inclusive and sustainable economic growth, full and productive employment and decent work for all' . 334 It requests in its target 8.8 to 'Protect labour rights and promote safe and secure working environments for all workers, including migrant workers, in particular women migrants, and those in precarious employment.'\nThe Preamble to the Constitution 335 of the ILO includes as an objective ' … the protection of the worker against sickness, disease and injury arising out of his employment ...' . In 2022, the objective of a safe and healthy working environment became part of the 'Declaration on Fundamental Principles and Rights at Work', adding OSH to the existing four basic principles, that is, 1) freedom of association and right to collective bargaining, 2) the elimination of all forms of forced or compulsory labour, 3) the effective abolition of child labour, and 4) the elimination of discrimination. Between the year of the foundation in 1919 and today, the ILO agreed on more than 40 conventions and recommendations addressing OSH, be it either general provisions or provisions for specific groups and sectors or specific risks. 336\nThe EU and its predecessors have enshrined health and safety of workers in their founding treaties . Already in 1951, it was stated in Article 3 of the European Coal and Steel Community (ECSC) Treaty that 'The institutions of the Community shall, within the limits of their respective powers, in the common interest … promote improved working conditions and an improved standard of living for the workers in each of the industries for which it is responsible …' . 337 During the development of the European institutions and the EU from those years until today, references to working conditions and safety and health were always part of the treaties, and also in the latest Treaty of Lisbon from 2009. 338", - "page_start": 117, - "page_end": 117, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 11: Performance of each model for Retrieval and Reranking.\nSolon-embeddings-large-0.1, Allopr ofRetrie v al.Retrieval = 0.47. sentence-croissant-llm-base, SyntecReranking.Reranking = 0.78. sentence-croissant-llm-base, Allopr ofReranking.Reranking = 0.57. sentence-croissant-llm-base, SyntecRetrie v al.Reranking = 0.74. sentence-croissant-llm-base, BSARDRetrie v al.Retrieval = 0.52. sentence-croissant-llm-base, Allopr ofRetrie v al.Retrieval = 0.30. bert-base-multilingual-cased, SyntecReranking.Reranking = 0.43. bert-base-multilingual-cased, Allopr ofReranking.Reranking = 0.32. bert-base-multilingual-cased, SyntecRetrie v al.Reranking = 0.19. bert-base-multilingual-cased, BSARDRetrie v al.Retrieval = 0.10. bert-base-multilingual-cased, Allopr ofRetrie v al.Retrieval = 0.02. bert-base-multilingual-uncased, SyntecReranking.Reranking = 0.59. bert-base-multilingual-uncased, Allopr ofReranking.Reranking = 0.33. bert-base-multilingual-uncased, SyntecRetrie v al.Reranking = 0.35. bert-base-multilingual-uncased, BSARDRetrie v al.Retrieval = 0.16. bert-base-multilingual-uncased, Allopr ofRetrie v al.Retrieval = 0.06. camembert-base, SyntecReranking.Reranking = 0.36. camembert-base, Allopr ofReranking.Reranking = 0.26. camembert-base, SyntecRetrie v al.Reranking = 0.06. camembert-base, BSARDRetrie v al.Retrieval =", - "page_start": 22, - "page_end": 22, - "source_file": "arxiv4.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "In the context of research publication, what is HAL ?", - "target_page": 3, - "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Query\nFigure 6: Extracts of HAL dataset.", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "D Evaluation results\nTable 5: Baselines results for HAL on a classification task and topic modeling.", - "page_start": 13, - "page_end": 13, - "source_file": "arxiv4.pdf" - }, - { - "text": "Researchers are mobile!\nFor example,\n30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE\nSource: Science Magazine\nResearch institutions and organizations therefore find it hard to\nBenchmark their organization against others\nIdentify, track, and report on researchers' a/ffiliations and contributions (publications, peer reviews, grants, and more)", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "RESEARCHERS\nImprove recognition and discoverability of their research\nSpend more time doing research, less time managing it\nControl and manage a trusted and easily shareable record of their research activities and a/ffiliations - for free", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "Query\nFigure 6: Extracts of HAL dataset.\nhal-02899209, Domain = shs. hal-02899209, Title = La transformation digitale du manage- ment des ressources humaines et de ses enjeux pour les entreprises. tel-03993881, Domain = math. tel-03993881, Title = Sur l'approximation numérique de quelques problèmes en mécanique des fluides", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "Existing Project Example: HathiTrust Research Center (HTRC)\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university libraries and today is 'an international community of research libraries committed to the long-term curation and availability of the cultural record.' It started in what it calls the 'early 33 days of mass digitization' - that is, at a time when it started to become economical to take existing physical artifacts in libraries and turn them into digital files at a large scale.\nThe founding members of HathiTrust were among the initial partners for Google's Book Search product, which allows people to search across and view small snippets of text from in-copyright books and read full copies of public domain books scanned from libraries' 34 collections. The libraries provided Google with books from their collections, Google would then scan the books for use in Book Search, and return to the libraries a digital copy for their own uses. These uses included setting up HathiTrust not only to ensure long-term preservation of the digital books and their metadata, but also to facilitate other uses, including full text search of books and accessibility for people with print disabilities. In separate court cases, both Google and HathiTrust's uses of the books were deemed consistent with copyright law.\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as the Research Center. The Center grew in part out of a research discipline called 'digital humanities,' which, among other things, seeks to use computational resources or other digital technologies to analyze information and contribute to the study of literature, media, history, and other areas. For instance, imagine you want to understand how a given term (e.g., 'war on drugs') became used; one might seek to analyze when the term was first used and how often it was used over time by analyzing a vast quantity of sources, searching out the term's use. The insight here is that there is much to be learned not just from reading or otherwise consuming specific material, but also from 'non-consumptive research,' or \"research in which computational analysis is performed on one or more volumes (textual or image objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use.", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Abstract\nTransformer-based models have pushed state of the art in many areas of NLP, but our understanding of what is behind their success is still limited. This paper is the first survey of over 150 studies of the popular BERT model. We review the current state of knowledge about how BERT works, what kind of information it learns and how it is represented, common modifications to its training objectives and architecture, the overparameterization issue and approaches to compression. We then outline directions for future research.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\nHyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields. Scrapping this resource, we fetched 85,000 publications in French 5 . We extracted IDs, titles and the author's choice among domain labels. The last 2 are provided by authors when submitting their papers to HAL. Since domain annotations are provided, the dataset can be used for many tasks, such as topic modeling or text classification. To ensure the dataset quality is suitable for a benchmark, further data cleaning has been performed:\n· Duplicates are eliminated, retaining unique publications for each field.\n· Irrelevant titles (due to API indexing mistakes) or titles in languages other than French have been manually removed.\n3 https://www.syntec.fr/convention-collective/\n4 https://huggingface.co./datasets/lyon-nlp/ mteb-fr-retrieval-syntec-s2p\n5 https://huggingface.co./datasets/lyon-nlp/ clustering-hal-s2s\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.", - "page_start": 1, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.\nSamples, Syntec = 100 queries. Samples, HAL = 26233 samples. Samples, SummEvalFr = 100 texts. , Syntec = 90 documents. , HAL = 10 classes. , SummEvalFr = 1100 human summaries. Creation process Annotation process, Syntec = Scraping of Syntec col- lective bargaining agree- ment with articles as doc- uments. Writing queries corresponding to articles. 4 annotators divided into. Creation process Annotation process, HAL = Scraping of HAL arti- cles with id , title and do- main . Further cleaning with deduplication, lan- guage filtering and class subsampling. Annotations provided by. Creation process Annotation process, SummEvalFr = 1600 machine summaries Translation from English to French with Deepl of the SummEval dataset. Detailed annotation pro-. Quality checks, Syntec = wrote 25 questions. Human verification of an- notations.. Quality checks, HAL = Baseline models for clas- sification and topic model- ing.. Quality checks, SummEvalFr = Correlation between BLEU and ROUGE scores of the French and the original English datasets. LLM as-a-judge translation rating and human verification.", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its products throughout the United States and internationally. The Company's customers include hospitals, distributors, and other manufacturers. As of December 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. ('Atrion Medical Products'), Halkey-Roberts Corporation ('Halkey-Roberts') and Quest Medical, Inc. ('Quest Medical').", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "What is the effect of embedding dimension on embedding representation quality ?", - "target_page": 6, - "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "D.2 Evaluation results per task\nTable 9: Average performance of models per task category.\n0.29. text-embedding-3-large, A v erage = 0.71. text-embedding-3-large, BitextMining = 0.96. text-embedding-3-large, Classification = 0.74. text-embedding-3-large, Clustering = 0.48. text-embedding-3-large, P airClassification = 0.80. text-embedding-3-large, Reranking = 0.86. text-embedding-3-large, Retrie v al = 0.73. text-embedding-3-large, STS = 0.81. text-embedding-3-large, Summarization = 0.30. text-embedding-3-small, A v erage = 0.69. text-embedding-3-small, BitextMining = 0.95. text-embedding-3-small, Classification = 0.70. text-embedding-3-small, Clustering = 0.49. text-embedding-3-small, P airClassification = 0.77. text-embedding-3-small, Reranking = 0.81. text-embedding-3-small, Retrie v al = 0.68. text-embedding-3-small, STS = 0.79. text-embedding-3-small, Summarization = 0.30. text-embedding-ada-002, A v erage = 0.69. text-embedding-ada-002, BitextMining = 0.95. text-embedding-ada-002, Classification = 0.69. text-embedding-ada-002, Clustering = 0.51. text-embedding-ada-002, P airClassification = 0.77. text-embedding-ada-002, Reranking = 0.82. text-embedding-ada-002, Retrie v al = 0.67. text-embedding-ada-002, STS = 0.78. text-embedding-ada-002, Summarization", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv4.pdf" - }, - { - "text": "4.1 BERT embeddings\nIn studies of BERT, the term \"embedding\" refers to the output of a Transformer layer (typically, the final one). Both conventional static embeddings (Mikolov et al., 2013) and BERT-style embeddings can be viewed in terms of mutual information maximization (Kong et al., 2019), but the latter are contextualized . Every token is represented by a vector dependent on the particular context of occurrence, and contains at least some information about that context (Miaschi and Dell'Orletta, 2020).\nSeveral studies reported that distilled contextualized embeddings better encode lexical semantic information (i.e. they are better at traditional word-level tasks such as word similarity). The methods to distill a contextualized representation into static include aggregating the information across multiple contexts (Akbik et al., 2019; Bommasani et al., 2020), encoding \"semantically bleached\" sentences that rely almost exclusively on the meaning of a given word (e.g. \"This is <>\") (May et al., 2019), and even using contextualized embeddings to train static embeddings (Wang et al., 2020d).\nBut this is not to say that there is no room for improvement. Ethayarajh (2019) measure how similar the embeddings for identical words are in every layer, reporting that later BERT layers produce more context-specific representations 3 . They also find that BERT embeddings occupy a narrow cone in the vector space, and this effect increases from the earlier to later layers. That is, two random words will on average have a much higher cosine similarity than expected if embeddings were directionally uniform (isotropic) . Since isotropy was shown to be beneficial for static word embeddings (Mu and Viswanath, 2018), this might be a fruitful direction to explore for BERT.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 7: Models included in the benchmark with their main characteristics. The size in Gb is estimated using the number of parameters counted as float32 numbers. Sentence sim refers to the fact that the model was trained on a task that favors semantic similarity.\nEmb. dim. = 384. text2vec-base-multilingual, License = Apache-2.0. text2vec-base-multilingual, Sentence sim = Yes. text-embedding-ada-002, Finetuned = N/A. text-embedding-ada-002, Language = multilingual. text-embedding-ada-002, # params = N/A. text-embedding-ada-002, Size (Gb) = N/A. text-embedding-ada-002, Seq. Len. = 8191. text-embedding-ada-002, Emb. dim. = 1536. text-embedding-ada-002, License = Closed source. text-embedding-ada-002, Sentence sim = N/A. text-embedding-3-small, Finetuned = N/A. text-embedding-3-small, Language = multilingual. text-embedding-3-small, # params = N/A. text-embedding-3-small, Size (Gb) = N/A. text-embedding-3-small, Seq. Len. = 8191. text-embedding-3-small, Emb. dim. = 1536. text-embedding-3-small, License = Closed source. text-embedding-3-small, Sentence sim = N/A. text-embedding-3-large, Finetuned = N/A. text-embedding-3-large, Language = multilingual. text-embedding-3-large, # params = N/A. text-embedding-3-large, Size (Gb) = N/A. text-embedding-3-large, Seq. Len. = 8191. text-embedding-3-large, Emb. dim. = 3072.", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv4.pdf" - }, - { - "text": "6 Limitations\nFocus on sentence embeddings Finally, like the original version of MTEB, the comparison focuses mainly on sentence embeddings. Other tasks could be added to cover word embeddings and, therefore, more NLP tasks.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv4.pdf" - }, - { - "text": "1 Introduction\nEmbeddings are dense vector representations that capture the semantics of an input. The first emblematic example is Word2Vec, introduced by Mikolov et al. (2013). It consists of neural architectures trained to learn high-quality word representations from contextual relationships in vast amounts of text. Other models were proposed since then, leveraging the transformer architecture (Vaswani et al., 2017) to produce both generic and contextualized word embeddings using self-attention. Many models now exist with various architectures, monolingual or multilingual, pre-trained or fine-tuned (Naseem et al., 2021; Ding et al., 2023).\nIn this work, our primary objective is to introduce a large-scale embedding benchmark for\n1 French table on: https://huggingface.co./spaces/ mteb/leaderboard", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv4.pdf" - }, - { - "text": "Q1: Is there a model that outstands on all tasks?\nModels performances for each task are presented in appendix Tables 9, 10, 11, 12 and 13. Figure 1 shows the critical difference diagram of average score ranks.\nAs in MTEB (Muennighoff et al., 2022), no model claims state-of-the-art in all tasks even if the text-embedding-3-large model is in first place on average on all tasks (see Table 9). It ranks first for the classification and reranking tasks. For the clustering task, text-embedding-ada-002 is the best model. The models voyage-code-2 , textembedding-3-small and mistral-embed share the top positions in the retrieval task ranking. For the pair classification task, laser2 is ahead of its competitors. Finally, sentence-camembert-large leads on the STS task and multilingual-e5-small has the best results for summarization.\nFigure 1 shows a global model comparison across all datasets. The models are arranged horizontally according to their performance, with the best models on the left. The black bars represent the statistical equivalence between the models' performances. The statistically equivalent top performers for this benchmark are OpenAI's models text-embedding-3-large , text-embedding-3small and text-embedding-ada-002 . Interestingly, many models do not show a significant performance gap between their base and large flavours. Some French models stand out among the multilingual models, such as Solon-embeddings-large0.1 , sentence_croissant_alpha_v0.3 and sentencecamembert-large .", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv4.pdf" - }, - { - "text": "following:\n· Tuned for sentence similarity : 0.727\n· Finetuned vs pretrained : 0.544\n· Model number of parameters : 0.49\n· Embedding dimension : 0.452\n· Closed source : 0.449\n· Max sequence length : 0.336\n· Multilingual : 0.103\n· English : 0.025\n· English but tuned on other languages : -0.025\n· French : -0.134\n· Bilingual : -0.135\nAdditionally, all cross-correlations between characteristics are reported in appendix Figure 10.\nAs expected, the score most strongly correlates with whether the evaluated models were trained on a sentence similarity task. Of course, this criterion is connected to the more general Finetuned one. The only top-performing models solely pre-trained are from the E5 family, where the pre-training is, in fact, contrastive and optimized for similarity. Conversely, models pre-trained on token-level tasks and generating embeddings via pooling appear less well-suited for the benchmark tasks.\nFurthermore, we observe a performance correlation with the embedding dimension and the model's number of parameters, which are often correlated themselves. This appears very clearly on the relative ranking of E5 and T5 models (see Figure 1). However, some small models perform very well on the benchmark, such as the standard version of the multilingual universal sentence encoder or Solon-embeddings-base-1.0 . Notably, the maximum sequence length, while an important criterion for generative tasks with LLMs, is less correlated with performance than the other dimensions. This can be explained by many datasets containing relatively small texts (see appendix Table 3 showing that 14 datasets have less than 50 tokens).\nRegarding language, it is surprising that good performance is not particularly correlated with French models in particular. In reality, the other aspects of the models, such as being fine-tuned\nFigure 1: Critical difference diagram representing the significant rank gaps between models. The axis represents the normalized average rank of the models (lower is better). The black bars indicate that the difference in models' rank is not statistically significant, i.e. lower than the critical difference.\nfor similarity, prevail. Nevertheless, we can highlight the excellent performance of a few French models such as sentence-camembert and sentencecroissant and Solon-embeddings .", - "page_start": 5, - "page_end": 6, - "source_file": "arxiv4.pdf" - }, - { - "text": "4.1 BERT embeddings\nSince BERT embeddings are contextualized, an interesting question is to what extent they capture phenomena like polysemy and homonymy. There is indeed evidence that BERT's contextualized embeddings form distinct clusters corresponding to word senses (Wiedemann et al., 2019; Schmidt and Hofmann, 2020), making BERT successful at word sense disambiguation task. However, Mickus et al. (2019) note that the representations of the same word depend on the position of the sentence in which it occurs , likely due to the NSP objective. This is not desirable from the linguistic point of view, and could be a promising\n3 Voita et al. (2019a) look at the evolution of token embeddings, showing that in the earlier Transformer layers, MLM forces the acquisition of contextual information at the expense of the token identity, which gets recreated in later layers.\navenue for future work.\nThe above discussion concerns token embeddings, but BERT is typically used as a sentence or text encoder. The standard way to generate sentence or text representations for classification is to use the [CLS] token, but alternatives are also being discussed, including concatenation of token representations (Tanaka et al., 2020), normalized mean (Tanaka et al., 2020), and layer activations (Ma et al., 2019). See Toshniwal et al. (2020) for a systematic comparison of several methods across tasks and sentence encoders.", - "page_start": 3, - "page_end": 4, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.3 Network Parameterization\nWe use a Vision Transformer (ViT) (Dosovitskiy et al., 2020; Arnab et al., 2021) as our video backbone. To process a video with a transformer network, we split the video clip into a 3D grid of L spatio-temporal patches, where a patch consists of a 16 × 16 pixel block spanning 2 consecutive frames; we refer to these spatio-temporal patches as tokens. This sequence of tokens is then directly processed by the stack of transformer blocks. In-\nuts x and y correspond to masked regions of a video, we apply the video masks by simply dropping a subset of the tokens. We apply masking at the input of the x -encoder, and at the output of the y -encoder to construct contextualized targets (Baevski et al., 2022b). The encoder is parameterized using standard ViT networks, while the predictor is a narrow transformer implemented using 12 blocks with an embedding dimension of 384 . Taking inspiration from masked autoencoders (He et al., 2021), our predictor takes as input the sequence of embeddings produced by the x -encoder as well as a sequence of learnable mask tokens with positional embeddings indicating the spatio-temporal positions of the y tokens. The output of the predictor is an embedding vector for each mask token; see Figure 3 and refer to Appendix B for more details.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv3.pdf" - }, - { - "text": "Abstract\nRecently, numerous embedding models have been made available and widely used for various NLP tasks. The Massive Text Embedding Benchmark (MTEB) has primarily simplified the process of choosing a model that performs well for several tasks in English, but extensions to other languages remain challenging. This is why we expand MTEB to propose the first massive benchmark of sentence embeddings for French. We gather 15 existing datasets in an easy-to-use interface and create three new French datasets for a global evaluation of 8 task categories. We compare 51 carefully selected embedding models on a large scale, conduct comprehensive statistical tests, and analyze the correlation between model performance and many of their characteristics. We find out that even if no model is the best on all tasks, large multilingual models pre-trained on sentence similarity perform exceptionally well. Our work comes with open-source code, new datasets and a public leaderboard 1 .", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv4.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "What is the maximum amount covered by the FWC of the europeean chemical agency ?", - "target_page": 6, - "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "I.5.1. Maximum amount of the FWC and maximum prices\nThe maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million). However, this does not bind the contracting authority to purchase for the maximum amount.\nThe maximum unit prices of the services are:\nSenior experts:\n[ ] EUR per man-day\nExperts:\n[ ] EUR per man-day", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.18.1. Grounds for termination by the contracting authority\nThe contracting authority may terminate the FWC or any on-going specific contract in the following circumstances:\n(a) if provision of the services under an on-going specific contract has not actually started within 15 days of the scheduled date and the contracting authority considers that the new date proposed, if any, is unacceptable, taking into account Article II.11.2;\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence required for implementation of the FWC ;\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or request for service or is in breach of another substantial contractual obligation or repeatedly refuses to sign specific contracts. Termination of three or more specific contracts in these circumstances also constitutes grounds for termination of the FWC;\n(d) if the contractor or any person that assumes unlimited liability for the debts of the contractor is in one of the situations provided for in points (a) and (b) of Article 136(1) of the Financial Regulation 6 ;\n(e) if the contractor or any related person is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n(f) if the procedure for awarding the FWC or the implementation of the FWC prove to have been subject to irregularities , fraud or breach of obligations ;\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) No 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No 223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No 966/2012, OJ L 193 of 30.7.2018, p.1 https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n30", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "This FWC sets out:\n1. the procedure by which the contracting authority may order services from the contractor;\n2. the provisions that apply to any specific contract which the contracting authority and the contractor may conclude under this FWC; and\n3. the obligations of the parties during and after the duration of this FWC.\nAll documents issued by the contractor (end-user agreements, general terms and conditions, etc.) except its tender are held inapplicable, unless explicitly mentioned in the special conditions of this FWC. In all circumstances, in the event of contradiction between this FWC and documents issued by the contractor, this FWC prevails, regardless of any provision to the contrary in the contractor's documents.\n2\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nTable of Content\n3\n4\nContract number: ECHA/2019/355\nFWC conditions of October 2018", - "page_start": 1, - "page_end": 4, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "I.3. Entry into force and duration of the FWC\nI.3.1 The FWC enters into force on the date on which the last party signs it.\nI.3.2 The implementation of the FWC cannot start before its entry into force.\nI.3.3 The FWC is concluded for a period of 24 months with effect from the date of its entry into force.\nI.3.4 The parties must sign any specific contract before the FWC expires.\nThe FWC continues to apply to such specific contracts after its expiry. The services relating to such specific contracts must be performed no later than six months after the expiry of the FWC.", - "page_start": 4, - "page_end": 4, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.4. Provision of services\nII.4.1 Signature of the FWC does not guarantee any actual purchase. The contracting authority is bound only by specific contracts implementing the FWC.\nII.4.2 The contractor must provide services of high quality standards, in accordance with the state of the art in the industry and the provisions of this FWC, in particular the tender specifications and the terms of its tender. Where the contracting authority has the right to make modifications to the results , they must be delivered in a format and with the necessary information which effectively allow such modifications to be made in a convenient manner.\nII.4.3 The contractor must comply with the minimum requirements provided for in the tender specifications. This includes compliance with applicable obligations under environmental, social and labour law established by Union law, national law and collective agreements or by the international environmental, social and labour law provisions listed in Annex X to Directive 2014/24/EU4 3 , compliance with data protection obligations resulting from Regulation (EU) 2016/6795 4 and Regulation (EU) 2018/1725 5 .\n3 OJ L 94 of 28.03.2014, p. 65\n4 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC, OJ L 119, 4.5.2016, p. 1, https://eurlex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n5 Regulation (EU) 2018/1725 of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement\n15\nContract number: ECHA/2019/355\nFWC conditions of October 2018", - "page_start": 14, - "page_end": 15, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.1. Definitions\n'Pre-existing material' : any material, document, technology or know-how which exists prior to the contractor using it for the production of a result in the implementation of the FWC ;\n'Pre-existing right' : any industrial and intellectual property right on pre-existing material ; it may consist in a right of ownership, a licence right and/or right of use belonging to the contractor, the creator , the contracting authority as well as to any other third parties;\n'Professional conflicting interest' : a situation in which the contractor's previous or ongoing professional activities affect its capacity to implement the FWC or to perform a specific contract to an appropriate quality standard.\n'Related person' : any natural or legal person who is a member of the administrative, management or supervisory body of the contractor, or who has powers of representation, decision or control with regard to the contractor;\n'Request for services' : a document from the contracting authority requesting that the contractors in a multiple FWC with re-opening of competition provide a specific tender for services whose terms are not entirely defined under the FWC;\n14\nContract number: ECHA/2019/355\nFWC conditions of October 2018\n'Result' : any intended outcome of the implementation of the FWC , whatever its form or nature. A result may be further defined in this FWC as a deliverable. A result may, in addition to newly created materials produced specifically for the contracting authority by the contractor or at its request, also include pre-existing materials ;\n'Specific contract' : a contract implementing the FWC and specifying details of a service to be provided;\n'Supplier portal' : the e-PRIOR portal, which allows the contractor to exchange electronic business documents, such as invoices, through a graphical user interface.", - "page_start": 13, - "page_end": 14, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "5.2 Technological developments - influence on OSH\nAccording to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic chemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment (not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294\nThe ESENER 2019 survey provides information about sectors that reported a particularly high prevalence of dangerous substances . The percentage of enterprises reporting handling or exposure to chemicals are: 50% in 'Manufacturing', 49% in 'Construction, waste management, and water and electricity supply', and 47% in 'Human health and social work activities'. 295\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive regulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework Directive, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in other policy areas contributes to the reduction of risks from dangerous substances in workplaces, such as EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling and packaging of chemicals, its predecessor directive was already issued in 1967; REACH the regulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also specific EU and international legislation on specific aspects such as chemicals in waste, storage and transport, in specific products like batteries and cars, in specific sectors like agriculture, in natural environments like in water and soil, and in consumer products like food, detergents and cosmetics).\nEuropean Agency for Safety and Health at Work - EU-OSHA\n107\nOccupational safety and health in Europe - state and trends 2023\nBiological agents have always been a risk at workplaces in several sectors, particularly in health and care, in agriculture and the food industry, in laboratories, and in wastewater treatment, waste disposal and recycling. Also, climate change will raise the risks from biological agents in Europe, due to the expected warming that allows biological agents from tropical and subtropical regions to migrate to Europe. 296 An increasing resistance of bacteria towards antibiotic treatment is a particular risk in hospitals and care institutions.", - "page_start": 106, - "page_end": 107, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Annex 3: Global Warming Potentials (GWPs)\nCarbon dioxide, Chemical formula = CO2. Carbon dioxide, 1995 IPCC GWP = 1. Methane, Chemical formula = CH4. Methane, 1995 IPCC GWP = 21. Nitrous oxide, Chemical formula = N2O. Nitrous oxide, 1995 IPCC GWP = 310. HFC-23, Chemical formula = CHF3. HFC-23, 1995 IPCC GWP = 11,700. HFC-32, Chemical formula = CH2F2. HFC-32, 1995 IPCC GWP = 650. HFC-41, Chemical formula = CH3F. HFC-41, 1995 IPCC GWP = 150. HFC-43-10mee, Chemical formula = C5H2F10. HFC-43-10mee, 1995 IPCC GWP = 1,300. HFC-125, Chemical formula = C2HF5. HFC-125, 1995 IPCC GWP = 2,800. HFC-134, Chemical formula = C2H2F4. HFC-134, 1995 IPCC GWP = 1,000. HFC-134a, Chemical formula = CH2FCF3. HFC-134a, 1995 IPCC GWP = 1,300. HFC-152a, Chemical formula = C2H4F2. HFC-152a, 1995 IPCC GWP = 140. HFC-143, Chemical formula = C2H3F3. HFC-143, 1995 IPCC GWP = 300. HFC-143a, Chemical formula = CF3CH3. HFC-143a, 1995 IPCC GWP = 3,800. HFC-227ea, Chemical formula = C3HF7. HFC-227ea, 1995 IPCC GWP = 2,900. HFC-236fa, Chemical formula = C3H2F6. HFC-236fa, 1995 IPCC GWP = 6,300. HFC-254ca, Chemical formula = C3H3F5. HFC-254ca, 1995 IPCC GWP = 560. Perfluoromethane, Chemical formula = CF4. Perfluoromethane, 1995 IPCC GWP = 6,500. Perfluroethane, Chemical", - "page_start": 47, - "page_end": 47, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "II.18.1. Grounds for termination by the contracting authority\nContract number: ECHA/2019/355\nFWC conditions of October 2018\n(g) if the contractor does not comply with applicable obligations under environmental, social and labour law established by Union law, national law, collective agreements or by the international environmental, social and labour law provisions listed in Annex X to Directive 2014/24/EU;\n(h) if the contractor is in a situation that could constitute a conflict of interest or a professional conflicting interest as referred to in Article II.7;\n(i) if a change to the contractor's legal, financial, technical, organisational or ownership situation is likely to substantially affect the implementation of the FWC or substantially modify the conditions under which the FWC was initially awarded;\n(j) in the event of force majeure , where either resuming implementation is impossible or the necessary ensuing amendments to the FWC or a specific contract would mean that the tender specifications are no longer fulfilled or result in unequal treatment of tenderers or contractors;\n(k) if the needs of the contracting authority change and it no longer requires new services under the FWC; in such cases ongoing specific contracts remain unaffected;\n(l) if the termination of the FWC with one or more of the contractors means that the multiple FWC with reopening of competition no longer has the minimum required level of competition;\n(m) if the contractor is in breach of the data protection obligations resulting from Article II.9.2;\n(n) if the contractor does not comply with the applicable data protection obligations resulting from Regulation (EU) 2016/679.", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.24. Checks and audits\nII.24.5 In accordance with Council Regulation (Euratom, EC) No 2185/96 of 11 November 1996 concerning on-the-spot checks and inspection carried out by the Commission in order to protect the European Communities' financial interests against fraud and other irregularities and Regulation (EU, Euratom) No 883/2013 of the European Parliament and of the Council of 11 September 2013 concerning investigations conducted by the European Anti-Fraud Office, the European AntiFraud Office may carry out investigations, including on the spot checks and inspections, to establish whether there has been fraud , corruption or any other illegal activity under the contract affecting the financial interests of the Union. Findings arising from an investigation may lead to criminal prosecution under national law.\nThe investigations may be carried out at any moment during the provision of the services and up to five years starting from the payment of the balance of the last specific contract issued under this FWC.\nII.24.6 The Court of Auditors, the European Public Prosecutor's Office established by Council Regulation (EU) 2017/19397 7 ('the EPPO') and, for the processing of personal data, the European Data Protection Supervisor have the same rights as the contracting authority, particularly right of access, for the purpose of checks,\n7 Council Regulation (EU) 2017/1939 of 12 October 2017 implementing enhanced cooperation on the establishment of the European Public Prosecutor's Office\n38\nContract number: ECHA/2019/355\nFWC conditions of October 2018\naudits and investigations.\n39\nContract number: ECHA/2019/355\nFWC conditions of October 2018", - "page_start": 37, - "page_end": 39, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "How can I get compensation if the european chemical agency terminates a contract we have ?", - "target_page": 11, - "target_passage": "If the FWC or a specific contract is terminated: a) neither party is entitled to compensation", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "II.18.4. Effects of termination\nThe contractor is liable for damage incurred by the contracting authority as a result of the termination of the FWC or a specific contract, including the additional cost of appointing and contracting another contractor to provide or complete the services, except if the damage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article II.18.2. The contracting authority may claim compensation for such damage.\nThe contractor is not entitled to compensation for any loss resulting from the termination of the FWC or a specific contract, including loss of anticipated profits, unless the loss was caused by the situation specified in Article II.18.2.\nThe contractor must take all appropriate measures to minimise costs, prevent damage and cancel or reduce its commitments.\nWithin 60 days of the date of termination, the contractor must submit any report, deliverable or result and any invoice required for services that were provided before the date of termination.\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific contract with each member of the group separately on the basis of points (d), (e) or (g) of Article II.18.1, under the conditions set out in Article II.11.2", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Eric McCrady -Managing Director and CEO\nThe Managing Director's employment contract has a three year term commencing 1 January 2014 with base remuneration of US$370,000 per year which is reviewed annually by the Remuneration and Nominations Committee. He is eligible to participate in the Incentive Compensation Plan. The Managing Director is entitled to the specified remuneration and benefits through the term of the agreement. The Company may terminate the Managing Director's employment at any time for good cause (for example, material breach of contract, gross negligence) without notice and the Managing Director may give 90 days' notice to terminate the employment contract; both of which result in the Managing Director receiving pay through the period of services performed.\nIn the instance of a change in control of the Company, at the instigation of the Board of Directors, if the Managing Director's title and duties are substantially reduced then the Managing Director, within two months of such reduction in status, may provide two weeks written notice to the Company as being terminated by the Company other than for good cause and will receive his base salary through the end of the contract term.\nAt the date of this report, no other directors nor other key management personnel have employment contracts.\n- 40 -", - "page_start": 41, - "page_end": 41, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Duties on employers\n4. -(1) An employer with more than 50 employees who is the employer of any person who is required to undertake workforce tests or has responsibility for any agency worker who is required to undertake workforce tests, must take reasonable steps to facilitate the taking of those tests by that person or agency worker in accordance with these Regulations.\n(2) In the discharge of the duty under sub-paragraph (1), an employer must have regard to any guidance issued by the Secretary of State for the purposes of this paragraph.\n(3) In sub-paragraph (1) an employer has responsibility for an agency worker if-\n(a) the agency worker is supplied or to be supplied by a person (an 'agent') to the employer under a contract or other arrangements made between the agent and the employer; and\n(b) the agency worker is not-\n(i) a worker because of the absence of a worker's contract between the agency worker and the agent or the employer, or\n(ii) a party to a contract under which the agency worker undertakes to do the work for another party to a contract whose status is, by virtue of the contract, that of a client or customer of any profession or business undertaking carried on by the agency worker.", - "page_start": 67, - "page_end": 67, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "II.18.3. Procedure for termination\nA party must formally notify the other party of its intention to terminate the FWC or a specific contract and the grounds for termination.\nThe other party has 30 days following the date of receipt to submit observations, including the measures it has taken or will take to continue fulfilling its contractual obligations. Failing that, the decision to terminate becomes enforceable the day after the time limit for submitting observations has elapsed.\nIf the other party submits observations, the party intending to terminate must formally notify it either of the withdrawal of its intention to terminate or of its final decision to terminate.\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in Article II.18.2, the date on which the termination takes effect must be specified in the formal notification .\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes effect on the day following the date on which the contractor receives notification of termination.\nIn addition, at the request of the contracting authority and regardless of the grounds for termination, the contractor must provide all necessary assistance, including information, documents and files, to allow the contracting authority to complete, continue or transfer the services to a new contractor or internally, without interruption or adverse effect on the\n31\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nquality or continuity of the services. The parties may agree to draw up a transition plan detailing the contractor's assistance unless such plan is already detailed in other contractual documents or in the tender specifications. The contractor must provide such assistance at no additional cost, except if it can demonstrate that it requires substantial additional resources or means, in which case it must provide an estimate of the costs involved and the parties will negotiate an arrangement in good faith.", - "page_start": 30, - "page_end": 31, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.18.1. Grounds for termination by the contracting authority\nThe contracting authority may terminate the FWC or any on-going specific contract in the following circumstances:\n(a) if provision of the services under an on-going specific contract has not actually started within 15 days of the scheduled date and the contracting authority considers that the new date proposed, if any, is unacceptable, taking into account Article II.11.2;\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence required for implementation of the FWC ;\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or request for service or is in breach of another substantial contractual obligation or repeatedly refuses to sign specific contracts. Termination of three or more specific contracts in these circumstances also constitutes grounds for termination of the FWC;\n(d) if the contractor or any person that assumes unlimited liability for the debts of the contractor is in one of the situations provided for in points (a) and (b) of Article 136(1) of the Financial Regulation 6 ;\n(e) if the contractor or any related person is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n(f) if the procedure for awarding the FWC or the implementation of the FWC prove to have been subject to irregularities , fraud or breach of obligations ;\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) No 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No 223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No 966/2012, OJ L 193 of 30.7.2018, p.1 https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n30", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.13.10. Visibility of ECHA funding and disclaimer\nWhen making use of the results , the contractor must declare that they have been produced under a contract with the contracting authority and that the opinions expressed are those of the contractor only and do not represent the contracting authority's official position. The contracting authority may waive this obligation in writing or provide the text of the disclaimer.", - "page_start": 26, - "page_end": 26, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "I.11. Termination by either party 2\nEither party may terminate the FWC and/or the FWC and specific contracts by sending formal notification to the other party with three months written notice.\nIf the FWC or a specific contract is terminated:\na) neither party is entitled to compensation;\nb) the contractor is entitled to payment only for the services provided before termination takes effect.\nThe second, third and fourth paragraphs of Article II.18.4 apply.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "I.4.3. Implementation of FWC in cascade\nThe FWC is implemented as follows: the contracting authority orders services by sending a request for offer for a specific contract to the contractor who is ranked first in the cascade.\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor must either:\n(a) send the specific tender back to the contracting authority; or\n(b) send an explanation of why it cannot accept the order.\nIf the contractor does not accept the order or fails to observe the deadline or to submit an acceptable offer for the Agency, or if it is in a situation of conflicting interests that may negatively affect the performance of the specific contract (see Article II.7), the contracting authority may place the order with the next contractor on the cascade.\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send them back on time, the contractor may be considered in breach of its obligations under this FWC as set out in Article II.18.1 (c).\nWithin a maximum of 5 working days of a specific contract or order form being sent by the Agency to the contractor, the Agency shall receive it back, duly signed and dated. The period allowed for the execution of the tasks shall start to run on the date of signature of the specific contract or order form by both parties.", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Onerous Contracts\nWe make provisions for onerous contracts when the unavoidable costs of meeting our obligation under the contract exceed the benefits we expect to realize from it. We measure these provisions at the present value of the expected cost of terminating the contract or the expected cost of continuing with the contract (whichever is lower). We recognize any impairment loss on the assets associated with the contract before we make the provision.\nSee note 17 for a breakdown of our provisions.", - "page_start": 101, - "page_end": 101, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "II.17.1. Suspension by the contractor\nIf the contractor is affected by force majeure , it may suspend the provision of the services under a specific contract.\nThe contractor must immediately notify the contracting authority of the suspension. The notification must include a description of the force majeure and state when the contractor expects to resume the provision of services.\nThe contractor must notify the contracting authority as soon as it is able to resume performance of the specific contract , unless the contracting authority has already terminated the FWC or the specific contract.", - "page_start": 28, - "page_end": 28, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "According to the european chemical agency contracts, what is considers a grave professional misconduct ?", - "target_page": 14, - "target_passage": "'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "2 Setting the scene\nEuropean Agency for Safety and Health at Work - EU-OSHA\n21\nOccupational safety and health in Europe - state and trends 2023\nThe analytical distinctions were mostly made according to work and workplace-related criteria, like occupation, type of work, different contractual conditions and, in some cases, emphasising differences between EU Member States; it presents fewer data on characteristics of different worker groups, like age, sex and origin.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n22\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 20, - "page_end": 22, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "5.2 Technological developments - influence on OSH\nAccording to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic chemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment (not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294\nThe ESENER 2019 survey provides information about sectors that reported a particularly high prevalence of dangerous substances . The percentage of enterprises reporting handling or exposure to chemicals are: 50% in 'Manufacturing', 49% in 'Construction, waste management, and water and electricity supply', and 47% in 'Human health and social work activities'. 295\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive regulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework Directive, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in other policy areas contributes to the reduction of risks from dangerous substances in workplaces, such as EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling and packaging of chemicals, its predecessor directive was already issued in 1967; REACH the regulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also specific EU and international legislation on specific aspects such as chemicals in waste, storage and transport, in specific products like batteries and cars, in specific sectors like agriculture, in natural environments like in water and soil, and in consumer products like food, detergents and cosmetics).\nEuropean Agency for Safety and Health at Work - EU-OSHA\n107\nOccupational safety and health in Europe - state and trends 2023\nBiological agents have always been a risk at workplaces in several sectors, particularly in health and care, in agriculture and the food industry, in laboratories, and in wastewater treatment, waste disposal and recycling. Also, climate change will raise the risks from biological agents in Europe, due to the expected warming that allows biological agents from tropical and subtropical regions to migrate to Europe. 296 An increasing resistance of bacteria towards antibiotic treatment is a particular risk in hospitals and care institutions.", - "page_start": 106, - "page_end": 107, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Duties on employers\n4. -(1) An employer with more than 50 employees who is the employer of any person who is required to undertake workforce tests or has responsibility for any agency worker who is required to undertake workforce tests, must take reasonable steps to facilitate the taking of those tests by that person or agency worker in accordance with these Regulations.\n(2) In the discharge of the duty under sub-paragraph (1), an employer must have regard to any guidance issued by the Secretary of State for the purposes of this paragraph.\n(3) In sub-paragraph (1) an employer has responsibility for an agency worker if-\n(a) the agency worker is supplied or to be supplied by a person (an 'agent') to the employer under a contract or other arrangements made between the agent and the employer; and\n(b) the agency worker is not-\n(i) a worker because of the absence of a worker's contract between the agency worker and the agent or the employer, or\n(ii) a party to a contract under which the agency worker undertakes to do the work for another party to a contract whose status is, by virtue of the contract, that of a client or customer of any profession or business undertaking carried on by the agency worker.", - "page_start": 67, - "page_end": 67, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "II.1. Definitions\n'Formal notification' (or 'formally notify'): form of communication between the parties made in writing by mail or email, which provides the sender with compelling evidence that the message was delivered to the specified recipient;\n'Fraud': an act or omission committed in order to make an unlawful gain for the perpetrator or another by causing a loss to the Union's financial interests, and relating to: i) the use or presentation of false, incorrect or incomplete statements or documents, which has as its effect the misappropriation or wrongful retention of funds or assets from the\n13\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nUnion budget, ii) the non-disclosure of information in violation of a specific obligation, with the same effect or iii) the misapplication of such funds or assets for purposes other than those for which they were originally granted, which damages the Union's financial interests;\n'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.\n'Implementation of the FWC' : the purchase of services envisaged in the FWC through the signature and performance of specific contracts ;\n'Interface control document' : the guideline document which lays down the technical specifications, message standards, security standards, checks of syntax and semantics, etc. to facilitate machine-to-machine connection. This document is updated on a regular basis;\n'Irregularity' : any infringement of a provision of Union law resulting from an act or omission by an economic operator, which has, or would have, the effect of prejudicing the Union's budget.\n'Notification' (or 'notify'): form of communication between the parties made in writing including by electronic means;\n'Order form' : a simplified form of specific contract by which the contracting authority orders services under this FWC;\n'Performance of a specific contract' : the execution of tasks and delivery of the purchased services by the contractor to the contracting authority;\n'Personnel' : persons employed directly or indirectly or contracted by the contractor to implement the FWC;", - "page_start": 12, - "page_end": 13, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "List of figures\nEuropean Agency for Safety and Health at Work - EU-OSHA\n5\nOccupational safety and health in Europe - state and trends 2023\nEuropean Agency for Safety and Health at Work - EU-OSHA\n6\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 4, - "page_end": 6, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "6.1 Foundation, legislation, compliance and supervision\nOccupational safety and health in Europe - state and trends 2023\n· adapting the work to the individual but also preference of collective solutions ;\n· adaptation to technical progress ;\n· giving adequate instructions ;\n· consultation obligations , that is, worker participation; and\n· training requirements for OSH practitioners and professionals in enterprises.\nIt directed the scope of the legislation from prescribed worker protection rules to active preventive formation of the work environment. 343 The Framework Directive does not refer to specific workplace risks, instead it lays down general principles to prevent, reduce or eliminate risks. Many pieces of previous EU legislation like the Directive on the protection of workers from risks related to exposure to chemical, physical and biological agents at work from 1980 344 and the Directive on the protection of workers from noise from 1986 345 were updated after 1989 to fully comply with the provisions of the Framework Directive.\nBased on the principles of the Framework Directive, 24 individual OSH directives 346 lay down specific measures to cope with risks and exposures for: workplaces and equipment (work places, workplace equipment, explosive atmospheres, warning and safety signs, PPE, display screens), exposure to chemical agents (chemical agents at work, carcinogens and mutagens, occupational exposure limits), to physical hazards (ionising radiation, electromagnetic fields, artificial optical radiation, noise, vibrations) and to biological agents (biological agents at work), and ergonomic risks (handling of loads). Some of them deal with sector-specific risks (in construction, mineral extraction, fishing and healthcare) or specifically with worker groups (young workers, pregnant workers, temporary workers).\nThe chronological overview of the directives suggests that a main phase of legislator activity lasted approximately 15 years, between 1989 and 2004 . 347\nEuropean Agency for Safety and Health at Work - EU-OSHA\n119\nOccupational safety and health in Europe - state and trends 2023\nTable 33: EU Directives on Occupational Safety and Health\nEuropean Agency for Safety and Health at Work - EU-OSHA\n120\nOccupational safety and health in Europe - state and trends 2023\n.", - "page_start": 118, - "page_end": 120, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "List of tables\nEuropean Agency for Safety and Health at Work - EU-OSHA\n7\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 6, - "page_end": 7, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "EU open data\nThe portal data.europa.eu provides access to open datasets from the EU institutions, bodies and agencies. These can be downloaded and reused for free, for both commercial and non-commercial purposes. The portal also provides access to a wealth of datasets from European countries.\nThe European Agency for Safety and Health at Work (EU-OSHA) contributes to making Europe a safer, healthier and more productive place to work. The Agency researches, develops and distributes reliable, balanced and impartial safety and health information and organises panEuropean awareness-raising campaigns. Set up by the European Union in 1994 and based in Bilbao, Spain, the Agency brings together representatives from the European Commission, Member State governments and employers' and workers' organisations, as well as leading experts in each of the EU Member States and beyond.\nEuropean Agency for Safety and Health at Work (EU-OSHA)\nSantiago de Compostela 12, 5th floor 48003 Bilbao Spain Tel: (+34) 944 358 400 Email: information@osha.europa.eu\nhttps://osha.europa.eu", - "page_start": 162, - "page_end": 163, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "II.24. Checks and audits\nII.24.5 In accordance with Council Regulation (Euratom, EC) No 2185/96 of 11 November 1996 concerning on-the-spot checks and inspection carried out by the Commission in order to protect the European Communities' financial interests against fraud and other irregularities and Regulation (EU, Euratom) No 883/2013 of the European Parliament and of the Council of 11 September 2013 concerning investigations conducted by the European Anti-Fraud Office, the European AntiFraud Office may carry out investigations, including on the spot checks and inspections, to establish whether there has been fraud , corruption or any other illegal activity under the contract affecting the financial interests of the Union. Findings arising from an investigation may lead to criminal prosecution under national law.\nThe investigations may be carried out at any moment during the provision of the services and up to five years starting from the payment of the balance of the last specific contract issued under this FWC.\nII.24.6 The Court of Auditors, the European Public Prosecutor's Office established by Council Regulation (EU) 2017/19397 7 ('the EPPO') and, for the processing of personal data, the European Data Protection Supervisor have the same rights as the contracting authority, particularly right of access, for the purpose of checks,\n7 Council Regulation (EU) 2017/1939 of 12 October 2017 implementing enhanced cooperation on the establishment of the European Public Prosecutor's Office\n38\nContract number: ECHA/2019/355\nFWC conditions of October 2018\naudits and investigations.\n39\nContract number: ECHA/2019/355\nFWC conditions of October 2018", - "page_start": 37, - "page_end": 39, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.18.1. Grounds for termination by the contracting authority\nThe contracting authority may terminate the FWC or any on-going specific contract in the following circumstances:\n(a) if provision of the services under an on-going specific contract has not actually started within 15 days of the scheduled date and the contracting authority considers that the new date proposed, if any, is unacceptable, taking into account Article II.11.2;\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence required for implementation of the FWC ;\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or request for service or is in breach of another substantial contractual obligation or repeatedly refuses to sign specific contracts. Termination of three or more specific contracts in these circumstances also constitutes grounds for termination of the FWC;\n(d) if the contractor or any person that assumes unlimited liability for the debts of the contractor is in one of the situations provided for in points (a) and (b) of Article 136(1) of the Financial Regulation 6 ;\n(e) if the contractor or any related person is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n(f) if the procedure for awarding the FWC or the implementation of the FWC prove to have been subject to irregularities , fraud or breach of obligations ;\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) No 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No 223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No 966/2012, OJ L 193 of 30.7.2018, p.1 https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n30", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "What or Corning's corporate values ?", - "target_page": 12, - "target_passage": "Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "C OMMON S TOCK\n-changes in the mix of sales between premium and non-premium products,\n-facility expansions and new plant start-up costs,\n-adverse litigation or regulatory developments, including future or pending tax legislation,\n-adequacy and availability of insurance,\n-capital resource and cash flow activities,\n-capital spending,\n-equity company activities,\n-interest costs,\n-acquisition and divestiture activity,\n-the rate of technology change,\n-the ability to enforce patents,\nCorning Incorporated common stock is listed on the New York Stock Exchange and the SWX Swiss Exchange. In addition, it is traded on the Boston, Midwest, Pacific and Philadelphia stock exchanges. Common stock options are traded on the Chicago Board Options Exchange. The abbreviated ticker symbol for Corning Incorporated is 'GLW.'\nTRANSFER A GENT AND R EGISTRAR Computershare Investor Services LLC P.O. Box A-3504 Chicago, IL 60690-3504 Telephone: 800.255.0461 Website: www.computershare.com\nC HANGE OF A DDRESS\nReport change of address to Computershare Investor Services at the above address.\nINDEPENDENT A CCOUNTANTS PricewaterhouseCoopers LLP 1301 Avenue of the Americas New York, NY 10019\nCorning Incorporated\nOne Riverfront Plaza Corning, NY 14831-0001 607 974 9000\nwww.corning.com\n02BR24601EN\n-product performance issues,\n-stock price fluctuations, and\n-other risks detailed in Corning's SEC filings.\nNeither this report nor any statement contained herein is furnished in connection with any of\nCorning is an equal opportunity employer. Printed in USA\n© Corning Incorporated 2003\nTHE INTEGRATION OF OUR BELIEFS ,WISDOM ,CURIOSITY ,& KNOWLEDGE PROVIDES BALANCE & STABILITY .\nC ORPORATE VALUES :\nCorning's Values provide an unchanging moral and ethical compass that guides the actions of everyone in the company. The corporate values are: Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual.\nquality integri performance leadership innovation independence i i i i i i i T OTAL Q UALITY : In alignment with the quality policy of thecorporation, our policy is to achieve Total Quality performance. Total Quality performance means understanding who the customer is, what the requirements are, and meeting those requirements better than anyone else, without error, on time, every time.", - "page_start": 10, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "B A L A N C E\nCorning Annual Report 2002", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "A DDITIONAL INFORMATION\n'Safe Harbor' Statement under the Private Securities Litigation Reform Act of 1995 facts or information are forward-looking statements. These forward-looking statements involve risks and uncertainties that may cause the outcome to be materially different. Such risks and uncertainties include, but are not limited to:\n-global economic and political conditions,\n-currency fluctuations,\n-product demand and industry capacity,\n-competitive products and pricing,\n-\nsufficiency of manufacturing capacity and efficiencies,\n-cost reductions,\n-availability and costs of critical materials,\n-new product development and commercialization,\n-attracting and retaining key personnel,\n-order activity and demand from major customers,\n-fluctuations in capital spending by customers in the telecommunications industry and other business segments,\n-financial condition of customers,\nA copy of Corning's 2002 Annual Report on Form 10-K filed with the Securities and Exchange Commission is available upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831. The Annual Report on Form 10-K can also be accessed electronically through the Investor Relations category of the home page on the Internet at: www.corning.com\nINVESTOR INFORMATION\nInvestment analysts who need additional information may contact Mr. Kenneth C. Sofio, Manager of Investor Relations, Corning Incorporated, HQ-E2-25, Corning, NY 14831; Telephone 607.974.9000", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "AND CHIEF OPERATING OFFICER\nWe know that our shareholders are most eager to see a greater return on their investment with Corning, and of Wall Street's confidence. We are 100 percent committed to reaching that goal of profitability in 2003- and doing so within the rigorous compliance rules by which we have always been guided. Integrity characterizes all our relationships, both inside and outside of Corning, and we will never compromise that foundation of our reputation.\nWithin the context of our financial realities, however, we have not lost our sense of self. We will meet our goals…but the path we are taking to get there has been, and will continue to be, consistent with our Values. Integrity … quality … treating individuals with dignity and respect … these are the guiding principles of the decisions we make. We know that in adhering to our Values, solid business performance will follow.\n8", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Corporate Governance\n- 46 -", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Executive and\nCorporate Officers", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "S CIENCE & TECHNOLOGY\nCorning' the context of managing the sensitive balance between the near alignment of R&D and business objectives, and longer discovery research and new opportunity creation.\nOver the past year with business conditions. markets and create life-changing innovations.\nWe opportunities more quickly and efficiently. We critical intellectual assets of our scientific organization.\nOur R&D or new product development, but also new process development. lowered cost and increased quality performance.\nInnovation is one of Corning's core V language and mindset of the company. Even in the face of dif commitment to research and development.\nC RITICAL T ECHNOLOGIES : CHEMICAL VAPOR DEPOSITION\nM ATERIALS R ESEARCH : OPTICAL PROPERTIES\n7\nW ENDELL P. WEEKS\nJ AMES B. FLAWS", - "page_start": 8, - "page_end": 9, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Governance\nOur Board of Directors is responsible to our shareholders for the oversight of the company and for the imple mentation and operation of an effective and sound corporate governance environment. We believe that effective corporate governance contributes to long-term corporate performance. An effective governance structure should reinforce a culture of corporate integrity, foster the company's pursuit of long-term strategic goals of growth and profit and ensure quality and continuity of corporate leadership. Our directors will continue to be diligent in their efforts to preserve the public trust while fostering the long-term success of the company.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Dear Shareholders:\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is reflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement represents much more than a traditional 'mission,' and it goes much deeper than company policy. The beliefs and values represented in that document are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day.\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining a strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to maintain the company's long-standing tradition of an independent, well-informed, active, and engaged Board of Directors.\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company's accounting policies have always been conservative and straightforward. The Board's three committees - Audit; Human Resources and Compensation; Public Policy and Corporate Governance - have consisted entirely of non-management directors for many years.\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the New York Stock Exchange listing requirements - rules intended to improve corporate governance across the country. It is gratifying to report that HON INDUSTRIES governance practices were already in accord with the spirit of the rules.\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the management of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance.", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "As a Corning's investor, how can I get a summary of the annual meeting of shareholders ?", - "target_page": 11, - "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "C OMMON S TOCK\n-changes in the mix of sales between premium and non-premium products,\n-facility expansions and new plant start-up costs,\n-adverse litigation or regulatory developments, including future or pending tax legislation,\n-adequacy and availability of insurance,\n-capital resource and cash flow activities,\n-capital spending,\n-equity company activities,\n-interest costs,\n-acquisition and divestiture activity,\n-the rate of technology change,\n-the ability to enforce patents,\nCorning Incorporated common stock is listed on the New York Stock Exchange and the SWX Swiss Exchange. In addition, it is traded on the Boston, Midwest, Pacific and Philadelphia stock exchanges. Common stock options are traded on the Chicago Board Options Exchange. The abbreviated ticker symbol for Corning Incorporated is 'GLW.'\nTRANSFER A GENT AND R EGISTRAR Computershare Investor Services LLC P.O. Box A-3504 Chicago, IL 60690-3504 Telephone: 800.255.0461 Website: www.computershare.com\nC HANGE OF A DDRESS\nReport change of address to Computershare Investor Services at the above address.\nINDEPENDENT A CCOUNTANTS PricewaterhouseCoopers LLP 1301 Avenue of the Americas New York, NY 10019\nCorning Incorporated\nOne Riverfront Plaza Corning, NY 14831-0001 607 974 9000\nwww.corning.com\n02BR24601EN\n-product performance issues,\n-stock price fluctuations, and\n-other risks detailed in Corning's SEC filings.\nNeither this report nor any statement contained herein is furnished in connection with any of\nCorning is an equal opportunity employer. Printed in USA\n© Corning Incorporated 2003\nTHE INTEGRATION OF OUR BELIEFS ,WISDOM ,CURIOSITY ,& KNOWLEDGE PROVIDES BALANCE & STABILITY .\nC ORPORATE VALUES :\nCorning's Values provide an unchanging moral and ethical compass that guides the actions of everyone in the company. The corporate values are: Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual.\nquality integri performance leadership innovation independence i i i i i i i T OTAL Q UALITY : In alignment with the quality policy of thecorporation, our policy is to achieve Total Quality performance. Total Quality performance means understanding who the customer is, what the requirements are, and meeting those requirements better than anyone else, without error, on time, every time.", - "page_start": 10, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "A DDITIONAL INFORMATION\n'Safe Harbor' Statement under the Private Securities Litigation Reform Act of 1995 facts or information are forward-looking statements. These forward-looking statements involve risks and uncertainties that may cause the outcome to be materially different. Such risks and uncertainties include, but are not limited to:\n-global economic and political conditions,\n-currency fluctuations,\n-product demand and industry capacity,\n-competitive products and pricing,\n-\nsufficiency of manufacturing capacity and efficiencies,\n-cost reductions,\n-availability and costs of critical materials,\n-new product development and commercialization,\n-attracting and retaining key personnel,\n-order activity and demand from major customers,\n-fluctuations in capital spending by customers in the telecommunications industry and other business segments,\n-financial condition of customers,\nA copy of Corning's 2002 Annual Report on Form 10-K filed with the Securities and Exchange Commission is available upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831. The Annual Report on Form 10-K can also be accessed electronically through the Investor Relations category of the home page on the Internet at: www.corning.com\nINVESTOR INFORMATION\nInvestment analysts who need additional information may contact Mr. Kenneth C. Sofio, Manager of Investor Relations, Corning Incorporated, HQ-E2-25, Corning, NY 14831; Telephone 607.974.9000", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Principle 6: Respect the Rights of Shareholders\nThe Board fully recognises its responsibility to ensure that its shareholders are informed of all major developments affecting the Company. All shareholders, who have elected to do so, receive a copy of the Company's Annual Report and the Annual, Half Yearly and Quarterly Reports are prepared and posted on the Company's website in accordance with the ASX Listing Rules. Regular updates on operations are made via ASX releases. All information disclosed to the ASX is posted on Sundance's website as soon as possible after it is disclosed to the ASX. When analysts are briefed on aspects of the Company's operation, the material used in the presentation is immediately released to the ASX and posted on the Company's website. Sundance encourages its shareholders to attend its annual meetings and to discuss and question its Board and management. The Company's external auditor is requested to attend the annual general meeting and be available to answer shareholder questions about the conduct of the audit and the preparation and content of the audit report. The Shareholder Communications Policy is published on the Company's website under the corporate governance section.", - "page_start": 53, - "page_end": 53, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Annual General Meeting\nAll shareholders are encouraged to attend and participate in the Company's Annual General Meeting. Shareholders may attend in person or send a proxy as their representative.\nThe Company's external auditor is routinely invited to and attends the Annual General Meeting in order to respond to questions raised by shareholders relating to the content and conduct of the audit and accounting policies adopted by the Company in relation to the preparation of the financial statements.", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "ANNUAL MEETING\nThe Company's annual shareholders' meeting will be held at 10:30 a.m. on May 4, 2004, at the Holiday Inn, Highways 61 & 38 North, Muscatine, Iowa. Shareholders and other interested investors are encouraged to attend the meeting.", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Share Trading Policy\nIn the interests of shareholder confidence and compliance with insider trading laws, the Company has formal policies governing the trading of the Company's securities by Directors, officers and employees. Details of Directors' shareholdings are disclosed in the Directors' Report.\nThe policy prohibits Directors and employees from engaging in short-term trading of any of the Company's securities and buying or selling the Company's securities if they possess unpublished, price-sensitive information.\nDirectors and senior management may buy or sell Company securities in the four week period following significant announcements by the Company, including the release of the quarterly report, half-yearly results, the preliminary annual results and the lodgement of the Company's Annual Report (subject to the prohibition of dealing in the Company's securities if they possess unpublished price sensitive information).\nDirectors and senior management must also receive approval from the Chairman before buying or selling Company securities.\nThe Company's Share Trading Policy is available in the 'Corporate Governance' section of the Company's website.\n37\nCorporate Governance Statement", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "22. SUBSEQUENT EVENTS\na) In accordance with Articles 280-20 and 280-21 of the Commercial Code of Japan and a resolution approved at the annual general meeting of the shareholders held on June 23, 2004, the Board of Directors of the Company resolved on April 15, 2005 to grant stock subscription rights free of charge to certain employees of the Company and certain directors and employees of the Company's subsidiaries effective April 25, 2005. The holders of these rights are entitled to subscribe for shares of common stock of the Company at a fixed price of ¥1,119 per share. The maximum aggregate number of units and shares granted for subscription are 133,950 units and 13,395,000 shares, respectively.\nb) The following appropriations of retained earnings of the Company were approved at a shareholders' meeting held on June 21, 2005:", - "page_start": 104, - "page_end": 104, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "1. Directors, Directors' Shareholdings and Directors' Meetings\nThe names of Directors of the Company in office at the date of this report and details of the relevant interest of each of those Directors in shares in the Company at that date are as set out below:", - "page_start": 48, - "page_end": 48, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "ANNUAL MEETING\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The meeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company's offices at the Shentel Center, 500 Mill Road, Edinburg, Virginia.", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "How many employees did Corning company count at the end of 2002 ?", - "target_page": 5, - "target_passage": "We are continuing to invest in our people — all 23,200 of them", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "C OMMON S TOCK\n-changes in the mix of sales between premium and non-premium products,\n-facility expansions and new plant start-up costs,\n-adverse litigation or regulatory developments, including future or pending tax legislation,\n-adequacy and availability of insurance,\n-capital resource and cash flow activities,\n-capital spending,\n-equity company activities,\n-interest costs,\n-acquisition and divestiture activity,\n-the rate of technology change,\n-the ability to enforce patents,\nCorning Incorporated common stock is listed on the New York Stock Exchange and the SWX Swiss Exchange. In addition, it is traded on the Boston, Midwest, Pacific and Philadelphia stock exchanges. Common stock options are traded on the Chicago Board Options Exchange. The abbreviated ticker symbol for Corning Incorporated is 'GLW.'\nTRANSFER A GENT AND R EGISTRAR Computershare Investor Services LLC P.O. Box A-3504 Chicago, IL 60690-3504 Telephone: 800.255.0461 Website: www.computershare.com\nC HANGE OF A DDRESS\nReport change of address to Computershare Investor Services at the above address.\nINDEPENDENT A CCOUNTANTS PricewaterhouseCoopers LLP 1301 Avenue of the Americas New York, NY 10019\nCorning Incorporated\nOne Riverfront Plaza Corning, NY 14831-0001 607 974 9000\nwww.corning.com\n02BR24601EN\n-product performance issues,\n-stock price fluctuations, and\n-other risks detailed in Corning's SEC filings.\nNeither this report nor any statement contained herein is furnished in connection with any of\nCorning is an equal opportunity employer. Printed in USA\n© Corning Incorporated 2003\nTHE INTEGRATION OF OUR BELIEFS ,WISDOM ,CURIOSITY ,& KNOWLEDGE PROVIDES BALANCE & STABILITY .\nC ORPORATE VALUES :\nCorning's Values provide an unchanging moral and ethical compass that guides the actions of everyone in the company. The corporate values are: Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual.\nquality integri performance leadership innovation independence i i i i i i i T OTAL Q UALITY : In alignment with the quality policy of thecorporation, our policy is to achieve Total Quality performance. Total Quality performance means understanding who the customer is, what the requirements are, and meeting those requirements better than anyone else, without error, on time, every time.", - "page_start": 10, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "B A L A N C E\nCorning Annual Report 2002", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "A DDITIONAL INFORMATION\n'Safe Harbor' Statement under the Private Securities Litigation Reform Act of 1995 facts or information are forward-looking statements. These forward-looking statements involve risks and uncertainties that may cause the outcome to be materially different. Such risks and uncertainties include, but are not limited to:\n-global economic and political conditions,\n-currency fluctuations,\n-product demand and industry capacity,\n-competitive products and pricing,\n-\nsufficiency of manufacturing capacity and efficiencies,\n-cost reductions,\n-availability and costs of critical materials,\n-new product development and commercialization,\n-attracting and retaining key personnel,\n-order activity and demand from major customers,\n-fluctuations in capital spending by customers in the telecommunications industry and other business segments,\n-financial condition of customers,\nA copy of Corning's 2002 Annual Report on Form 10-K filed with the Securities and Exchange Commission is available upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831. The Annual Report on Form 10-K can also be accessed electronically through the Investor Relations category of the home page on the Internet at: www.corning.com\nINVESTOR INFORMATION\nInvestment analysts who need additional information may contact Mr. Kenneth C. Sofio, Manager of Investor Relations, Corning Incorporated, HQ-E2-25, Corning, NY 14831; Telephone 607.974.9000", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Operating Segment Information\n81,385. Capital expenditures:, 2003 = . Capital expenditures:, 2002 = . Capital expenditures:, 2001 = . Office furniture, 2003 = $ 17,619. Office furniture, 2002 = $ 17,183. Office furniture, 2001 = $ 29,785. Hearth products, 2003 = 12,577. Hearth products, 2002 = 6,132. Hearth products, 2001 = 7,149. General corporate, 2003 = 7,312. General corporate, 2002 = 2,570. General corporate, 2001 = (83). , 2003 = $ 37,508. , 2002 = $ 25,885. , 2001 = $ 36,851. Identifiable assets:, 2003 = . Identifiable assets:, 2002 = . Identifiable assets:, 2001 = . Office furniture, 2003 = $ 452,350. Office furniture, 2002 = $ 494,559. Office furniture, 2001 = $ 526,712. Hearth products, 2003 = 303,811. Hearth products, 2002 = 305,326. Hearth products, 2001 = 320,199. General corporate (b), 2003 = 265,665. General corporate (b), 2002 = 220,667. General corporate (b), 2001 = 114,980. , 2003 = $ 1,021,826. , 2002 = $ 1,020,552. , 2001 = $ 961,891\n(a) Included in operating profit for the office furniture segment are pretax charges of $8.5 million, $3.0 million, and $22.5 million for closing of facilities and impairment charges in 2003, 2002, and 2001, respectively. Included in operating profit for the hearth products segment is a pretax charge of $1.5 million for closing of facilities and impairment charges in 2001.\n(b) In 2002 the Company's information technologies departments became a shared service at the corporate level. The costs continue to be charged out to the segments; however, the assets and related depreciation are now classified as general corporate.\n53", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "General\nThe wireless industry in the late 1990's became increasingly competitive and the Company was not immune to these industry issues. The Clear Pay SM program, introduced by Sprint as a no-deposit offering in 2001, attracted high credit risk customers in the Company's markets. As the results began to materialize, the Company implemented deposits on this program (mid-April 2002), and experienced high levels of customer turnover (churn) and uncollectable accounts. The write-offs of uncollectable accounts peaked in the third quarter of 2002. During the fourth quarter of 2002 there was some evidence that the strengthened credit policy was having a favorable impact. Nonetheless, the 2002 net loss in the PCS operation was $5.4 million, as compared to $5.5 million in 2001. Despite the disappointing financial results for 2002, the PCS customer base grew by over 40%. While the PCS operation was adding customers, the cellular operation continued to lose its local customer base.\nThe growing belief that national branding was critical to our wireless operations, the expectation that roaming revenues from our analog cellular operation would not continue to grow, and the increase in the number of wireless competitors in our markets, prompted the Company to exit the cellular business in order to focus on our PCS operations. The Company entered into an agreement on November 21, 2002, to sell its 66% ownership interest in the Virginia 10 RSA cellular operation which was classified as a discontinued operation. The closing occurred February 28, 2003. The Company received $37.0 million in proceeds, including $5.0 million in escrow for two years and $1.7 million for working capital.", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Employees\nAs of December 31, 2004, we employed approximately 13,400 full-time employees, approximately 3,100 of whom were covered by collective bargaining agreements. Our management believes that we have good relations with our employees.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Employees\nAs of October 25, 2003, the Company had over 16,000 active employees.\n(d)\nExecutive Officers of the Registrant", - "page_start": 4, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n389,406,666. INTEREST-BEARING DEPOSITS, 2002 = 1,286,088,863. INTEREST-BEARING DEPOSITS, 2001 = 1,295,755,932. Total deposits, 2002 = 1,711,562,216. Total deposits, 2001 = 1,685,162,598. DIVIDENDS PAYABLE, 2002 = 4,327,374. DIVIDENDS PAYABLE, 2001 = 3,699,976. SECURITIES SOLD UNDER AGREEMENTS TO REPURCHASE, 2002 = 26,708,994. SECURITIES SOLD UNDER AGREEMENTS TO REPURCHASE, 2001 = 19,847,067. OTHER LIABILITIES, 2002 = 11,816,707. OTHER LIABILITIES, 2001 = 7,330,476. Total liabilities, 2002 = 1,754,415,291. Total liabilities, 2001 = 1,716,040,117. COMMITMENTS AND CONTINGENCIES, 2002 = . COMMITMENTS AND CONTINGENCIES, 2001 = . SHAREHOLDERS' EQUITY:, 2002 = . SHAREHOLDERS' EQUITY:, 2001 = . Common stock, $10 par value; authorized 20,000,000 shares;\n12,364,201 and 12,333,252 issued and outstanding at, 2002 = . Common stock, $10 par value; authorized 20,000,000 shares; 12,364,201 and 12,333,252 issued and outstanding at, 2001 = . December 31, 2002 and 2001, respectively, 2002 = 123,642,010. December 31, 2002 and 2001, respectively, 2001 = 123,332,520. Capital surplus, 2002 = 58,087,687. Capital surplus, 2001 = 57,824,061. Retained earnings, 2002 = 45,647,522. Retained earnings, 2001 = 28,375,353. Accumulated other comprehensive earnings, 2002 = 11,390,426. Accumulated other comprehensive earnings, 2001 = 4,122,079. Total shareholders' equity, 2002 = 238,767,645. Total shareholders' equity, 2001 = 213,654,013\nThe accompanying notes are an integral part of these consolidated financial statements.\nF-4\nConsolidated Statements of Earnings\nDecember 31, 2002, 2001 and 2000", - "page_start": 67, - "page_end": 68, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Operating Segment Information\nNet sales:, 2003 = . Net sales:, 2002 = . Net sales:, 2001 = . Office furniture, 2003 = $ 1,304,054. Office furniture, 2002 = $ 1,279,059. Office furniture, 2001 = $ 1,366,312. Hearth products, 2003 = 451,674. Hearth products, 2002 = 413,563. Hearth products, 2001 = 426,126. , 2003 = $ 1,755,728. , 2002 = $ 1,692,622. , 2001 = $ 1,792,438. Operating profit:, 2003 = . Operating profit:, 2002 = . Operating profit:, 2001 = . Office furniture (a), 2003 = $ 130,080. Office furniture (a), 2002 = $ 130,014. Office furniture (a), 2001 = $ 112,405. Hearth products (a), 2003 = 54,433. Hearth products (a), 2002 = 44,852. Hearth products (a), 2001 = 39,282. Total operating profit, 2003 = 184,513. Total operating profit, 2002 = 174,866. Total operating profit, 2001 = 151,687. Unallocated corporate expenses, 2003 = (33,582). Unallocated corporate expenses, 2002 = (34,312). Unallocated corporate expenses, 2001 = (35,426). Income before income taxes, 2003 = . Income before income taxes, 2002 = $ 140,554. Income before income taxes, 2001 = $. , 2003 = $ 150,931. , 2002 = . , 2001 = 116,261. Depreciation and, 2003 = . Depreciation and, 2002 = . Depreciation and, 2001 = . Office furniture, 2003 = $ 54,121. Office furniture, 2002 = $ 48,546. Office furniture, 2001 = $ 58,658. Hearth products, 2003 = 13,599. Hearth products, 2002 = 13,993. Hearth products, 2001 = 20,389. General corporate (b), 2003 = 5,052. General corporate (b), 2002 = 6,216. General corporate (b), 2001 = 2,338. , 2003 = $ 72,772. , 2002 = $ 68,755. , 2001 = $", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "What is the shortcut to mute myself in MS teams ?", - "target_page": 3, - "target_passage": "Use [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Meeting controls\nWhen you join meetings, a different window will pop-up. These are the controls you need to know:\nTip\nUse [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "1.1 Shortcut function:\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the shortcut.\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth connection status, time, power, brightness adjustment and other functions.\n3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest message (enter to view multiple messages)/some of the recently used menu functions, and turn on or off audio Bluetooth for calls.\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and scroll up and down to find the corresponding function.\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select one of them and set it with one-click.", - "page_start": 1, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "Handy to Know…\n Once an object is selected, be it a chart, a legend on the chart, or the like, you can rightclick on the object to see a shortcut menu specific to the selected object.\nMicrosoft Excel", - "page_start": 47, - "page_end": 47, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "3.3.2 Disable/Enable User\nThis function allows the NFP and PM to activate and/or de-activate users of their country.\n Log in as NFP or PM\n Hover the cursor on the 'Users Management' tab and click on the 'Users Administration' button. (see figure 21); this opens the Disable/Enable User screen (figure 22).", - "page_start": 14, - "page_end": 14, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.3.2.1 Enable User\nOn the Disable/Enable screen, search for the user whose account should be activated and un-tick the 'Disabled' box. (figure 22a).", - "page_start": 14, - "page_end": 14, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.3.2.2 Disable User\nOn the Disable/Enable screen, search for the user whose account should be de-activated and tick the 'Disabled' box (figure 22a).\nNAIIS-User-Manual.Docx\nPage 15\n10/02/2013", - "page_start": 14, - "page_end": 14, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "basketball, football)\n1.8.1 Select the corresponding exercise mode, click the 'Start' button on the screen to start the exercise; click the 'Start' button again to pause the recording of the exercise; click the 'End' button to end the recording, and save to the data.\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the recording time is less than 1 minute, the smartwatch will remind you that the data is too little to be saved.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E722 Font Formatting_2.xlsx...\n Click in cell A1 to make the cell with the main heading the active cell\n\nClick on the drop arrow next to the Font Size command in the Font group on the Home tab to display a gallery of available sizes\n Point to various sizes and notice how Live Preview shows you how the heading will look\n Click on 16 to change the heading to 16 pt\nYou can also change the font size of parts of a document, and you can use the Mini toolbar...\n Click in cell A2\n Click with the right-mouse button to display the minitoolbar and the shortcut menu\n Click on the drop arrow next to Font Size and click on 14\n Click in cell A3 to hide the toolbar", - "page_start": 22, - "page_end": 22, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "the financial period are:\nMr M Hannell\nChairman Non-executive\nMr E McCrady\nManaging Director and Chief Executive Officer\nMr D Hannes\nDirector - Non-executive\nMr N Martin\nDirector - Non-executive\nMr W Holcombe Director - Non-executive\nMs C Anderson Chief Financial Officer\nMs G Ford\nVice President of Exploration and Development\nBased on her increased responsibilities due to the Company's growth, Ms. Ford was deemed to be a KMP during the 2014 fiscal year. Prior to that time, Ms. Ford was not considered to be KMP\nOther than Directors and Officers of the Company listed above, there are no additional key management personnel.\n- 77 -", - "page_start": 78, - "page_end": 78, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Try it: Apply the Heading 1 style:\n1. Put your cursor somewhere in the heading above ('Make magic: use Heading styles') don't select anything.\n2. On the Home tab, find Styles , and select Heading 1 (keyboard shortcut Ctrl+Alt+1).\nTa-da! Now it looks like a heading, and acts like one too.", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "How can I make a channel visible to an invited member ?", - "target_page": 4, - "target_passage": "Channels can be: • Shared (visible to invited team members and external members of your organization who are not on the team)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Teams and channels\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\nTip\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\nTeams\nGeneral\nMarketing\nShared Channel\nA\nteam\nis a broad group of people that work together to get something\ndone. You can choose who is part of the team, and people can only access\nshared content by invitation. All teams are created with an associated\nGeneral channel that includes all team members by default.\nChannels\nA\nchannel\nis a central hub for a specific topic, within the larger team, where\npeople can hold focused conversations and organize a library of files.\nChannels can be:\n· Standard (visible to everyone on the team)\n· Private (only visible to select team members)\n· Shared (visible to invited team members and external members of your\norganization who are not on the team)\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun! Tip\nAN", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "Join meetings\nFrom the calendar tab, select the meeting you intend to join, then select join. . 1.\nA new screen will show up. Here you can choose how you want to appear in the meeting, and your audio preferences. 2.\n3. Then select join now. .", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "Please fill in the table - one line per pre-existing right\nAnnex - Statement of contractor concerning rights to delivered results (b)\nI, [ insert name of the authorised representative of the contractor ] representing [ insert name of the contractor ], party to the [framework] [specific] contract [ insert title and number ] ('the contractor') warrant that the contractor holds all rights to the delivered results listed below [ insert titles and description of relevant results ].\nThe above-mentioned results were prepared by [ insert names of creators ]. The creators transferred all their relevant rights to the results to [the contractor] [ insert name of the rights holder ] through [an agreement] [an employment contract] [a relevant extract of] which is attached to this statement.\nThe creators [received all their remuneration on [ insert date ]] [will receive all their remuneration as agreed within [ complete ] weeks from [delivery of this statement] [receipt of confirmation of acceptance of the work]. [The statement of the creators confirming payment is attached].\nDate, place, signature\nAnnex - Statement by the creator (or right holder) (c)\nConcerning [ insert name of the relevant result ] delivered as part of the [framework] [specific] contract [ insert title and number ] concluded between the contracting authority and [ name of the contractor ]\nI the undersigned [ insert name of the creator or authorised representative of the right holder ] [representing [ insert name of the right holder ]] declare that I am the right holder of: [ identify the relevant parts of the result ] [which I created] [for which I received rights from [ insert name of other right holder ]].\nAnnankatu 18, P.O. Box 400, FI-00121 Helsinki, Finland | Tel. +358 9 686180 | Fax +358 9 68618210 | echa.europa.eu\nContract number: [complete]\nRestricted\nFWC conditions of October 2018\nI am aware of the above [framework] [specific] contract, especially Articles [I.10 and II.13] concerning intellectual property rights and exploitation of the results and I confirm that I transferred all the relevant rights to [ insert name of contractor or other intermediary right holder ].\nI declare that [I have received full remuneration] [I agreed to receive remuneration by [ insert date ]].\n[As creator, I also confirm that I do not object to the following:", - "page_start": 47, - "page_end": 48, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\nTABLE l-l. Effect of Speed and Altitvde on Dwzmnic Prerrure\n169, -.,I I.c._- = . 338, -.,I I.c._- = . 507, -.,I I.c._- = . 616, -.,I I.c._- = . 845, -.,I I.c._- = . I, 013, -.,I I.c._- = ", - "page_start": 26, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Creating Fibre Channel hosts\nTo create Fibre Channel hosts, complete the following steps:\n1. Select Fibre Channel . The Fibre Channel configuration window opens (see Figure 8-4).\nFigure 8-4 Fibre Channel host configuration\nChapter 8. Hosts\n329\n330\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n2. Enter a host name and click the Host Port menu to get a list of all discovered WWPNs (see Figure 8-5).\nFigure 8-5 Available WWPNs\n3. Select one or more WWPNs for your host. The Storwize V7000 should have the host port WWPNs available if the host is prepared, as described in IBM Knowledge Center for host attachment. If they do not appear in the list, scan for new disks as required on the respective operating system and click the Rescan icon in the WWPN box. If they still do not appear, check the SAN zoning and repeat the scanning.\nCreating offline hosts: If you want to create hosts that are offline, or not connected at the moment, it is also possible to enter the WWPNs manually. Enter them into the Host Ports field to add them to the list.\n4. If you want to add more ports to your Host, click the Plus sign ( + ) to add all ports that belong to the specific host.\n5. If you are creating a Hewlett-Packard UNIX (HP-UX) or Target Port Group Support (TPGS) host, select the Host type (see Figure 8-6 on page 331). Select your host type. If your specific host type is not listed, select generic .\nFigure 8-6 Host type selection\n6. Click Add to create the host object.\n7. Click Close to return to the host window. Repeat these steps for all of your Fibre Channel hosts. Figure 8-7 shows the All Hosts window after creating a second host.\nFigure 8-7 Hosts view after creating a host\nAfter you complete the adding of Fibre Channel hosts, see Chapter 7, 'Volumes' on page 241 to create volumes and map them to the created hosts.", - "page_start": 350, - "page_end": 352, - "source_file": "sg247938.pdf" - }, - { - "text": "8.4.1 Creating hosts\nThis section describes how to create Fibre Channel and iSCSI hosts by using the Storwize V7000 GUI. It is assumed that hosts are prepared for attachment, as described in IBM Knowledge Center, and that the host WWPNs or their iSCSI initiator names are known.\nFor more information, see IBM Knowledge Center.\nChapter 8. Hosts\n327\n328\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nTo create a host, complete the following steps:\n1. Open the host configuration window by clicking Hosts (see Figure 8-3).\nFigure 8-3 Open the host window\n2. To create a host, click Add Host . If you want to create a Fibre Channel host, continue with 'Creating Fibre Channel hosts' on page 329. To create an iSCSI host, go to 'Creating iSCSI hosts' on page 331.", - "page_start": 348, - "page_end": 349, - "source_file": "sg247938.pdf" - }, - { - "text": "Add visuals with pictures from the web\nWord works with Bing to give you access to thousands of pictures you can use in your documents.\nTry it: Hit enter after this line to make a blank line:\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures , and then search for something, like puppy clip art .\n2. Select the picture you want, and select Insert .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Channel Placement\nUnfavourable channel placement could negatively affect the tier status and results of certain channels, including The Shopping Channel, Sportsnet, SportsnetONE, Sportsnet World, and our specialty channels, including Outdoor Life Network, The Biography Channel (Canada), G4 Canada, and FX (Canada).", - "page_start": 80, - "page_end": 80, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "3.13.1 Planning for large deployments\nEach I/O Group can have up to 512 host objects defined. This limit is the same whether hosts are attached by using FC, iSCSI, or a combination of both. To allow more than 512 hosts to access the storage, you must divide them into groups of 512 hosts or less, and map each group to single I/O Group only. This approach allows you to configure up to 2048 host objects on a system with four I/O Groups (eight nodes).\nFor best performance, split each host group into two sets. For each set, configure the preferred access node for volumes presented to the host set to one of the I/O Group nodes. This approach helps to evenly distribute load between the I/O Group nodes.\nChapter 3. Planning\n71\n72\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nNote: A volume can be mapped only to a host that is associated with the I/O Group to which the volume belongs.", - "page_start": 92, - "page_end": 93, - "source_file": "sg247938.pdf" - }, - { - "text": "8.4.4 Adding and deleting host ports\nTo configure host ports, complete the following steps:\n1. From the left menu, select Hosts → Ports by Host to open the associated pane (see Figure 8-50).\nFigure 8-50 Ports by Host\nChapter 8. Hosts\n361\n362\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n2. A list of all the hosts is displayed. The function icons indicate whether the host is Fibre Channel, iSCSI, or SAS attached. The port details of the selected host are shown to the right. You can add a new host object by clicking Add Host . If you click Actions (see Figure 8-51), the tasks that are described in 'Modifying Volume Mappings' on page 346 can be selected.\nFigure 8-51 Ports by Host actions", - "page_start": 382, - "page_end": 383, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "How can I notify a collegue mentionned in a chat message in Teams ?", - "target_page": 5, - "target_passage": "Tag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Connect through messages\nWhether you're in a meeting, channel, or a chat, your messaging box will look the same.", - "page_start": 4, - "page_end": 4, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "Respond\nTag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention. @\nReact to individual messages or quote them in a response.\nTip Going into format mode will prevent your message from sending when you hit [Enter], so it's a great way to draft and preview messages before sending them.\nTip If you want to revisit an important message later, hover on that message, select the three d , then choose 'Save.' Saved messages will be found under your profile picture dropdown menu.", - "page_start": 4, - "page_end": 4, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "1.5 message\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding apps in your mobile phone system, and switch on these apps or callings notifications functions on your watch, the notifications on your mobile phone can synchronize to your watch.\n1.5.1. Incoming call notification:\nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch will light up or vibrate.\n1.5.2. SMS notification:\nEnable the SMS notification in the app. When one or more SMS messages are received on the mobile phone, the watch will receive one or more SMS reminders at the same time.\n1.5.3. Other application message notifications:\nTurn on the corresponding application message notification in the app, such as WeChat, QQ, Outlook, Facebook and other applications. When the mobile phone receives one/multiple application message notifications, the watch will receive one/multiple corresponding message reminders at the same time.", - "page_start": 2, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "· Structure your message clearly, and include only the necessary information.\nTake care not to confuse the message by including too many topics in one e-mail. Respect your colleagues' time, and try to keep your messages as short as possible.", - "page_start": 52, - "page_end": 52, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "1.2 App notification\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the watch, the new messages received in your mobile phone will be pushed to the watch, and a total of 10 messages can be saved. The messages received after 10 messages will be overwritten one by one.\n2) Swipe to the bottom to click the delete icon to clear all message records.", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "Notifying another system when a load completes (AIX)\nTips: For more information about the codes for each message type that is logged in the system log, see Chapter 2, 'Common Server Messages', in IBM Content Manager OnDemand - Messages and Codes , SC27-1379. For example, message number 87 is listed as ARS0087I.", - "page_start": 276, - "page_end": 276, - "source_file": "sg246915.pdf" - }, - { - "text": "Syslog notifications\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a receiver on an IP network. The IP network can be IPv4 or IPv6. The system can send syslog messages that notify personnel about an event. You can use the Syslog pane to view the Syslog messages that are sent by the IBM Storwize V7000. To view the Syslog configuration, use the System pane and point to Settings and click Notification → Syslog (see Figure 5-55).\nFigure 5-55 Setting Syslog messages\nFrom this window, you can view and configure a syslog server to receive log messages from various systems and store them in a central repository by entering the following information:\n/SM590000 IP Address\nThe IP address for the syslog server.\n/SM590000 Facility\nThe facility determines the format for the syslog messages. The facility can be used to determine the source of the message.\n/SM590000 Message Format\nThe message format depends on the facility. The system can transmit syslog messages in the following formats:\n- The concise message format provides standard detail about the event.\n- The expanded format provides more details about the event.\n/SM590000 Event Notifications\nConsider the following points about event notifications:\n- Select Error if you want the user to receive messages about problems, such as hardware failures, that must be resolved immediately.\nImportant: Browse to Recommended Actions to run the fix procedures on these notifications.\n- Select Warning if you want the user to receive messages about problems and unexpected conditions. Investigate the cause immediately to determine whether any corrective action is necessary.\nImportant: Browse to Recommended Actions to run the fix procedures on these notifications.\n- Select Info if you want the user to receive messages about expected events. No action is required for these events.\nTo remove a syslog server, click the Minus sign ( -). To add another syslog server, click the Plus sign ( + ).\nThe syslog messages can be sent in concise message format or expanded message format.\nExample 5-1 shows a compact format syslog message.\nExample 5-1 Compact syslog message example", - "page_start": 185, - "page_end": 186, - "source_file": "sg247938.pdf" - }, - { - "text": "Teams and channels\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\nTip\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\nTeams\nGeneral\nMarketing\nShared Channel\nA\nteam\nis a broad group of people that work together to get something\ndone. You can choose who is part of the team, and people can only access\nshared content by invitation. All teams are created with an associated\nGeneral channel that includes all team members by default.\nChannels\nA\nchannel\nis a central hub for a specific topic, within the larger team, where\npeople can hold focused conversations and organize a library of files.\nChannels can be:\n· Standard (visible to everyone on the team)\n· Private (only visible to select team members)\n· Shared (visible to invited team members and external members of your\norganization who are not on the team)\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun! Tip\nAN", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "2.7.4 Syslog messages\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a receiver on an IP network. The IP network can be IPv4 or IPv6.\nIBM Storwize V7000 can send syslog messages that notify personnel about an event. The event messages can be sent in expanded or concise format. You can use a syslog manager to view the syslog messages that IBM Storwize V7000 sends.\nIBM Spectrum Virtualize uses the User Datagram Protocol (UDP) to transmit the syslog message. You can use the management GUI or the IBM Storwize V7000 CLI to configure and modify your syslog settings.", - "page_start": 62, - "page_end": 62, - "source_file": "sg247938.pdf" - }, - { - "text": "13.7.4 Syslog notifications\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a receiver on an IP network. The IP network can be IPv4 or IPv6. The system can send syslog messages that notify personnel about an event.\nYou can configure a syslog server to receive log messages from various systems and store them in a central repository by entering the following information (see Figure 13-64 on page 725):\n/SM590000 IP Address\nThe IP address for the syslog server.\n/SM590000 Facility\nThe facility determines the format for the syslog messages. The facility can be used to determine the source of the message.\n/SM590000 Message Format\nThe message format depends on the facility. The system can transmit syslog messages in the following formats:\n- The concise message format provides standard detail about the event.\n- The expanded format provides more details about the event.\n/SM590000 Event Notifications\nConsider the following points about event notifications:\n- Select Error if you want the user to receive messages about problems, such as hardware failures, that must be resolved immediately.\nImportant: Browse to Recommended Actions to run the fix procedures on these notifications.\n- Select Warning if you want the user to receive messages about problems and unexpected conditions. Investigate the cause immediately to determine whether any corrective action is necessary.\nImportant: Browse to Recommended Actions to run the fix procedures on these notifications.\n- Select Info if you want the user to receive messages about expected events. No action is required for these events.\nFigure 13-64 Syslog configuration\nTo remove a syslog server, click the Minus sign ( -).\nTo add another syslog server, click the Plus sign ( + ).\nThe syslog messages can be sent in concise message format or expanded message format.\nExample 13-4 shows a compact format syslog message.\nExample 13-4 Compact syslog message example\nIBM2076 #NotificationType=Error #ErrorID=077102 #ErrorCode=1091 #Description=Node Double fan failed #ClusterName=V7000G2_1 #Timestamp=Wed Jul 02 08:00:00 2017 BST #ObjectType=Node #ObjectName=Node1 #CopyID=0 #ErrorSequenceNumber=120", - "page_start": 745, - "page_end": 746, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What are the 3 prerequisites to be elligible as president of Botswana ?", - "target_page": 18, - "target_passage": "A person shall be qualified for election as President if, and shall not be qualified unless, he or she- (a) is a citizen of Botswana by birth or descent; (b) has attained the age of 30 years; and (c) is qualified to be elected as a Member of the National Assembly", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SCHEDULE 3\nCategory 3 countries and territories\n32\nRegulation 2(1)\nAngola\nArgentina\nBangladesh\nBolivia\nBotswana\nBrazil\nBurundi\nCape Verde\nChile", - "page_start": 31, - "page_end": 31, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "GENERAL DEFINITIONS AND STRUCTURAL REQUIREMENTS\nThere are strength requirements which ate common to all aircraft. In general, these requirements can be separated into three particular areas. These are detailed in the following discussion.", - "page_start": 343, - "page_end": 343, - "source_file": "00-80T-80.pdf" - }, - { - "text": "61. Q ualifications for election to N ational A ssem bly\nSubject to the provisions of section 62 of this C onstitution, a person shall be qualified to be elected as a M em ber of the N ational A ssem bly if, and shall not be qualified to be so elected unless-\n( a ) he or she is a citizen of B otsw ana;\n( b ) he or she has attained the age of 18 years;\n( c ) he or she is qualified for registration as a voter for the purposes of the election of the E lected M em bers of the N ational A ssem bly and is so registered; and\n( d ) he or she is able to speak, and, unless incapacitated by blindness or other physical cause, to read E nglish w ell enough to take an active part in the proceedings of the A ssem bly.", - "page_start": 27, - "page_end": 27, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Gary M. Christensen\nRetired President and\nChief Executive Officer,\nPella Corporation", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Senior Officers\nMichael L. Boyd\nPresident and Chief Executive Officer\nDavid Byrd\nExecutive Vice President and Trust Officer\nRobert Pate\nExecutive Vice President\nKatherine Reeves\nExecutive Vice President and Cashier\nMichael L. Boyd President and Chief Executive Officer", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Executive Officers\nJeffrey H. Smulyan Chairman of the Board, President and Chief Executive Officer\nWalter Z. Berger\nExecutive Vice President, Chief Financial Officer and Treasurer\nRandall Bongarten Television Division President\nRichard F. Cummings Radio Division President\nGary L. Kaseff\nExecutive Vice President, General Counsel\nPaul W. Fiddick International Division President\nMichael Levitan Senior Vice President, Human Resources\nGary Thoe\nPublishing Division President", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Probable Expansion Airspace\nBefore airspace included in an expansion area is determined as probable expansion airspace and, therefore, included in the Company's calculation of total available disposal capacity, the following criteria must be met:\n1. The land associated with the expansion airspace is either owned by the Company or is controlled by the Company pursuant to an option agreement;\n2. The Company is committed to supporting the expansion project Ñnancially and with appropriate resources;\n3. There are no identiÑed fatal Öaws or impediments associated with the project, including political impediments;\n4. Progress is being made on the project;\n5. The expansion is attainable within a reasonable time frame; and\n6. The Company believes it is likely the expansion permit will be received.\nUpon meeting the Company's expansion criteria, the rates used at each applicable landÑll to expense costs to acquire, construct, close and maintain a site during the post-closure period are adjusted to include probable expansion airspace and all additional costs to be capitalized or accrued associated with the expansion airspace.\nThe Company has identiÑed three sequential steps that landÑlls generally follow to obtain expansion permits. These steps are as follows:\n1. Obtaining approval from local authorities;\n2. Submitting a permit application to state authorities; and\n3. Obtaining permit approval from state authorities.\nOnce a landÑll meets the Company's expansion criteria, management continuously monitors each site's progress in obtaining the expansion permit. If at any point it is determined that an expansion area no longer meets the required criteria, the probable expansion airspace is removed from the landÑll's total available capacity and the rates used at the landÑll to expense costs to acquire, construct, cap, close and maintain a site during the post-closure period are adjusted accordingly.\n67", - "page_start": 74, - "page_end": 74, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Category 1 countries and territories\nColombia\nDemocratic Republic of the Congo\nEcuador\nEswatini\nEthiopia\nFrench Guiana\nGuyana\nIndia\nKenya\nLesotho\nMalawi\nThe Maldives\nMozambique\nNamibia\nNepal\nOman\nPakistan\nPanama\nParaguay\nPeru\nPhilippines\nQatar\nRwanda\nSeychelles\nSomalia\nSouth Africa\nSuriname\nTanzania\nTurkey\nUnited Arab Emirates\nUruguay\nVenezuela\nZambia\nZimbabwe\n33", - "page_start": 32, - "page_end": 32, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Senior Officers\nF. Scott Dueser\nChairman of the Board\nChuck A. Cowell\nPresident and Chief Executive Officer\nRon Fogle\nExecutive Vice President, Commercial Loans\nRobert S. Patterson\nExecutive Vice President and\nSenior Trust Officer\nJohn Prince\nExecutive Vice President, Personal Loans\nChuck A. Cowell President and Chief Executive Officer\nMario A. Luppino\nExecutive Vice President, Marketing and Retail\nGary Tucker, CDP\nExecutive Vice President and Chief Information Officer\nLeo Dennis\nExecutive Vice President, Chief Financial Officer and Cashier", - "page_start": 15, - "page_end": 15, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "(h) Restricted shares\nOn his appointment as Chief Executive Officer on 13 December 2000, 1,000,000 Restricted Shares were issued to Mr J C Ellice-Flint. The Restricted Shares were issued for nil consideration and are held under a trust structure. The Restricted Shares carry rights to dividends and bonus issues and allow Mr Ellice-Flint to instruct the trustee as to the exercise of voting rights. Legal title in the Restricted Shares will not pass to Mr Ellice-Flint until he has completed five years continuous service with the Group or his employment is earlier terminated by the Company (other than for cause).\nAnnual Report 2004\n67\n68", - "page_start": 68, - "page_end": 69, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What is the condition to be allowing to access the position of Director of public prosecution in Botswana ?", - "target_page": 25, - "target_passage": "A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SCHEDULE 3\nCategory 3 countries and territories\n32\nRegulation 2(1)\nAngola\nArgentina\nBangladesh\nBolivia\nBotswana\nBrazil\nBurundi\nCape Verde\nChile", - "page_start": 31, - "page_end": 31, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Fundamentals\nWith IAM, developers attach policies, JSON documents that define granular permissions, to resources. IAM provides pre-built AWS managed policies for common access levels. You can also define your own policies with the least-privilege level necessary to complete tasks.\nInformation about IAM policies may come at you fast. If it gets to be too much, put it in PARC :\n· P rincipal: entity that is allowed or denied access\n· A ction: type of access that is allowed or denied\n· R esource: AWS resources the action will act upon\n· C ondition: conditions for which the access is valid\nAt a high level, these four terms should be enough to get you started connecting serverless resources.", - "page_start": 40, - "page_end": 40, - "source_file": "serverless-core.pdf" - }, - { - "text": "4. INDEMNITY, ACCESS TO INFORMATION AND INDEPENDENT PROFESSIONAL ADVICE\nInformation in respect to indemnity and insurance arrangements for Directors and senior executives appears in the Directors' Statutory Report on page 49 of this Annual Report.\nThe Board Guidelines set out the circumstances and procedures pursuant to which a Director, in furtherance of his or her duties, may seek independent professional advice at the Company's expense. Those procedures require prior consultation with, and approval by, the Chairman and assurances as to the qualifications and reasonableness of the fees of the relevant expert and, under normal circumstances, the provision of the expert's advice to the Board.\nPursuant to a deed executed by the Company and each Director, a Director also has the right to have access to all documents which have been presented to meetings of the Board or to any Committee of the Board or otherwise made available to the Director whilst in office. This right continues for a term of seven years after ceasing to be a Director or such longer period as is necessary to determine relevant legal proceedings that commenced during that term.", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2.3 Director Performance Review and Evaluation\nIn fiscal year 2014, Sundance's Board regularly met, both formally and informally, to discuss Board matters and to ensure that the Board acts in an effective way. The Board is provided with information that allows it to discharge its duties effectively, and Non-Executive Directors can and do request additional information as necessary to make informed decisions. The skills, experience and expertise relevant to the position of Director held by each director in office at the date of the annual report can be found in the Directors' Report on pages 23 to 25.\nNo formal process exists for Directors to access continuing education, as this is not considered practicable for the size of the Company and the financial resources available. However the four Non-Executive Directors have wide experience of directors' duties and are involved in a variety of outside business and professional activities that add to their knowledge and professionalism.\nThe Company Secretary is D Connor. He is accountable to the Board through the Chairman and accessible to all Directors. The appointment and removal of the Company Secretary is a matter for decision by the Board as a whole.", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Granting administrative access to a user\nAs you might guess, granting administrative access to a user is still rather far reaching. An account with administrative level privileges will make getting started easier. For systems in production, follow the principle of least-privilege - granting only the minimum access necessary to accomplish tasks.\n· For a step-by-step guide to account types and login management, see Signing in to the AWS Management Console.\n· AWS Identity and Access Management (IAM) is the service to manage entities and resources authorized to use services and service resources.", - "page_start": 13, - "page_end": 13, - "source_file": "serverless-core.pdf" - }, - { - "text": "Chief Executive Officer Akara Resources PCL\nPakorn Sukhum joined the management team of Akara Resources PCL as Chief Executive Officer at the end of 2009. He brings to Akara over 24 years of industrial commercial managerial experience in various industries such as metallurgy, chemicals and ceramics in international and domestic markets of Thailand, having held senior management positions in both Thai and Multinational joint venture companies such as Basell Poyolefins, Bayer AG as well as Padeang Industry of Thailand. His major contributions and responsibilities have ranged from project management, commercial marketing and sales to business development.\nDirectors' Report\n42\nRemuneration Report . . . . . . . . . . . . . . 49\nAuditor's Independence Declaration 62\nDirect or s' Report", - "page_start": 41, - "page_end": 42, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "II.13.3. Exclusive rights\nThe Contracting Authority acquires the following exclusive rights:\n(a) reproduction: the right to authorise or prohibit direct or indirect, temporary or permanent reproduction of the results by any means (mechanical, digital or other) and in any form, in whole or in part;\n(b) communication to the public: the exclusive right to authorise or prohibit any display, performance or communication to the public, by wire or wireless means, including the making available to the public of the results in such a way that members of the public may access them from a place and at a time individually chosen by them; this also includes the communication on Internet and broadcasting by cable or by satellite;\n(c) distribution: the exclusive right to authorise or prohibit any form of distribution of results or copies of the results to the public, by sale or otherwise;\n(d) rental: the exclusive right to authorise or prohibit rental or lending of the results or of copies of the results ;\n(e) adaptation: the exclusive right to authorise or prohibit any modification of the results ;\n(f) translation: the exclusive right to authorise or prohibit any translation, adaptation, arrangement, creation of derivative works based on the results , and any other alteration of the results , subject to the respect of moral rights of authors, where applicable;\n(g) where the results are or include a database: the exclusive right to authorise or prohibit the extraction of all or a substantial part of the contents of the database to another medium by any means or in any form; and the exclusive right to authorise or prohibit the re-utilization of all or a substantial part of the contents of the database by the distribution of copies, by renting, by on-line or other forms of transmission;\n(h) where the results are or include a patentable subject-matter: the right to register them as a patent and to further exploit such patent to the fullest extent;\n24\nContract number: ECHA/2019/355\nFWC conditions of October 2018", - "page_start": 23, - "page_end": 24, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Non-executive Directors\nWithin the aggregate amount (being $1,500,000 per year) approved by shareholders at the Annual General Meeting of the Company held on 7 May 2004, the fees of the Chairman and non-executive Directors are set at levels which represent the responsibilities of and the time commitments provided by those Directors in discharging their duties. Regard is also had to the level of fees payable to non-executive Directors of comparable companies. Non-executive Directors' fees were increased effective 1 July 2004. Non-executive Directors, other than the Chairman, who are members of Board committees receive additional fees. Non-executive Directors may not participate in any of the Company's bonus, share or option plans.\nThe Directors determined to cease retirement allowances to non-executive Directors effective from 30 June 2004. Non-executive Directors appointed before 1 January 2004 are entitled to receive benefits accrued to that date, payable upon ceasing to hold office as a Director. The retirement payment (inclusive of superannuation guarantee charge entitlements) is made pursuant to an agreement entered into with each non-executive Director on terms approved by shareholders at the 1989 Annual General Meeting. These benefits have been fully provided for by the Company.", - "page_start": 76, - "page_end": 76, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "3.8. Need to better define what is Public Data\nTogether with citizens education, there is a huge challenge that Governments and the Open Data movement will have to face (hopefully together) in 2011 and beyond. This challenge is to update and expand the definition of Public Data and to have it accepted by lawmakers and public administrators.\n23/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nWhat is, exactly, Public Data? A definition that is accepted almost implicitly is \"data that is of public interest, that belongs to the whole community, data that every citizen is surely entitled to know and use\" . This definition is so generic that accepting it together with the assumption that all such data should be open as preached by the Open Data movement (online, as soon as possible, in machine readable format with an open license etc...) doesn't create any particular problem or conflict.\nReal problems however start as it has happened all too often so far, whenever we assume more or less consciously that \"Public Data\" in the sense defined above and data directly produced by Governments and Public Administrations, that is what's normally called PSI (Public Sector Information) are the same thing.\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public Data. But this is an age of privatization of many public services, from transportation to healthcare, energy and water management. This is an age in which many activities with potentially very serious impacts on whole communities, like processing of hazardous substances or toxic waste, happen outside Public Administrations. The paradox is that, as Sasaki put it, this increased privatization is happening in the very same period in which \" we are observing a worldwide diffusion of access to information laws that empower citizens to hold government agencies accountable.\"\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what constitutes traditional, official PSI. \"Public Data\" includes all that information plus the much bigger amount of data describing and measuring all the activities of private companies, from bus timetables to packaged food ingredients, aqueducts performances and composition of fumes released in the atmosphere, that have a direct impact on the health and rights of all citizens of the communities affected by the activities of those companies.", - "page_start": 22, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "Conditions\nConditions are specific rules for which the access is valid.", - "page_start": 44, - "page_end": 44, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What are considered \"disciplined force\" according to Botswana constitution ?", - "target_page": 16, - "target_passage": "\"disciplined force\" means- (a) a naval, military or air force; (b) a police force; or (c) a prison service", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "SCHEDULE 3\nCategory 3 countries and territories\n32\nRegulation 2(1)\nAngola\nArgentina\nBangladesh\nBolivia\nBotswana\nBrazil\nBurundi\nCape Verde\nChile", - "page_start": 31, - "page_end": 31, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "19. Interpretation and savings\n(1) In this C hapter, unless the context otherw ise requires-\n\"court\" m eans any court of law having jurisdiction in B otsw ana other than a court established by a disciplinary law , and in sections 4 and 6 of this C onstitution a court established by a disciplinary law ;\n\"disciplinary law \" m eans a law regulating the discipline of any disciplined force; \"disciplined force\" m eans-\n( a ) a naval, m ilitary or air force;\n( b ) a police force; or\n( c ) a prison service;\n\"legal representative\" m eans a person entitled to practise in B otsw ana as an advocate or attorney;\n\"m em ber\" , in relation to a disciplined force, includes any person w ho, under the law regulating the discipline of that force, is subject to that discipline.\n(2) In relation to any person w ho is a m em ber of a disciplined force raised under an A ct of P arliam ent, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent w ith or in contravention of any of the provisions of this C hapter other than sections 4, 6 and 7.\n(3) In relation to any person w ho is a m em ber of a disciplined force raised otherw ise than as aforesaid and law fully present in B otsw ana, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent w ith or in contravention of any of the provisions of this C hapter.\nC H A P TE R III\nC itizenship (ss 20-29: repealed)\n20 to 29 inclusive.\n[ R epealed. ]\nC H A P TE R IV\nThe Executive (ss 30-56)\nP A R T I\nThe President and the V ice-P resident (ss 30-41)", - "page_start": 15, - "page_end": 15, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Category 1 countries and territories\nColombia\nDemocratic Republic of the Congo\nEcuador\nEswatini\nEthiopia\nFrench Guiana\nGuyana\nIndia\nKenya\nLesotho\nMalawi\nThe Maldives\nMozambique\nNamibia\nNepal\nOman\nPakistan\nPanama\nParaguay\nPeru\nPhilippines\nQatar\nRwanda\nSeychelles\nSomalia\nSouth Africa\nSuriname\nTanzania\nTurkey\nUnited Arab Emirates\nUruguay\nVenezuela\nZambia\nZimbabwe\n33", - "page_start": 32, - "page_end": 32, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "6.1 Foundation, legislation, compliance and supervision\nThey conclude on a variety of aspects: 'During the last half-century, there has been a significant and well documented move away from prescriptive regulatory standards and efforts by national regulatory agencies to enforce them towards more principle-, performance- and process-based regulatory requirements …. This shift was originally informed by notions that traditional command and control strategies, however compromised by resource or governance, had achieved as much as they were likely to, and that different approaches were necessary to bring about the further improvements in OSH that were desired. 358 (regarding reasons of non-compliance at enterprise level see also the chapter on 'Prevention Practices in Enterprises').\nNot all worker groups, sectors or forms of work are equally covered by these directives. Since the first protective OSH legislations, some important groups or sectors had exceptions from full application of OSH legislation . Depending on the Member State, such exceptions are applied to selfemployed and contracted work, military, public sector, mining, workers in the marine sector and offshore installations, family members, personal and household services, work in charitable organisations, volunteers in general, and domestic and mobile workplaces. In addition to these existing exemptions, we can observe in the last two to three decades an accelerating trend of erosion of the conventional employer-employee relation. Examples are outsourcing of work to contractors, often to self-employed, or platform work.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n122\nOccupational safety and health in Europe - state and trends 2023\nObviously, most informal, and - in particular irregular and illegal types of work do not respect legal OSH obligations - and at the same time legal monitoring obligations also fail. The EU Fundamental Rights Agency (FRA) published several case studies and examples in a series called 'Severe labour exploitation reports; 359 these studies provide an insight into most irregular working conditions.\nUndeclared work is defined as paid and lawful (not criminal) activity but undeclared to public authorities. ('paid activities that are lawful as regards their nature but not declared to public authorities, taking into account the differences in the regulatory systems of Member States'.)", - "page_start": 121, - "page_end": 122, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Exemptions\n(i) are required to return to the United Kingdom temporarily,\n(ii) will thereafter depart to undertake essential government work related to the United Kingdom border outside of the United Kingdom.\n(2) For the purposes of sub-paragraph (1) and paragraph 3-\n(a) 'Crown servant' has the meaning given in section 12(1)(a) to (e) of the Official Secrets Act 1989( a );\n(b) 'essential government work' means work which has been designated as such by the relevant Department or employer;\n(c) 'government contractor' has the meaning given in section 12(2) of the Official Secrets Act 1989.\n3. -(1) A person who is a Crown servant, a government contractor, or a member of a visiting force, who-\n(a) is required to undertake work necessary to the delivery of essential defence activities;\n(b) has travelled from a point of origin within the common travel area or from a category 1 country or territory on a vessel or aircraft operated by, or in support of, Her Majesty's armed forces or by, or in support of, a visiting force and that vessel or aircraft has not taken on any persons, docked in any port or landed in any category 2 country or territory; or\n(c) has undertaken a continuous period of at least 10 days ending with the day immediately preceding the day of their arrival in the United Kingdom aboard a vessel operated by or in support of Her Majesty's Naval Service or by, or in support of, a visiting force, where they have not disembarked and that vessel has not taken on any persons or docked in any port outside of the common travel area for a period of at least 10 days ending with the day of its arrival in the United Kingdom.\n(2) For the purposes of sub-paragraph (1)-\n(a) 'defence' has the meaning given in section 2(4) of the Official Secrets Act 1989;\n(b) 'visiting force' means any body, contingent or detachment of the forces of a country, being a body, contingent or detachment for the time being present in the United Kingdom (including United Kingdom territorial waters), on the invitation of Her Majesty's Government in the United Kingdom.\n4. An official of a foreign Government, required to travel to the United Kingdom to undertake essential border security duties, or a contractor directly supporting these essential border security duties where-", - "page_start": 35, - "page_end": 35, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Annex 1: Non -Annex I (NAI) Parties\n127, South Africa = South Sudan. 127, ZAF = SSD. 128, South Africa = Sri Lanka. 128, ZAF = LKA. 129, South Africa = Sudan. 129, ZAF = SDN. 130, South Africa = Suriname. 130, ZAF = SUR. 131, South Africa = Swaziland. 131, ZAF = SWZ. 132, South Africa = Syrian Arab Republic. 132, ZAF = SYR. 133, South Africa = Tajikistan. 133, ZAF = TJK. 134, South Africa = Thailand. 134, ZAF = THA. 135, South Africa = The former Yugoslav Republic of Macedonia. 135, ZAF = MKD. 136, South Africa = Timor-Leste. 136, ZAF = TLS. 137, South Africa = Togo. 137, ZAF = TGO. 138, South Africa = Tonga. 138, ZAF = TON. 139, South Africa = Trinidad and Tobago. 139, ZAF = TTO. 140, South Africa = Tunisia. 140, ZAF = TUN. 141, South Africa = Turkmenistan. 141, ZAF = TKM. 142, South Africa = Tuvalu. 142, ZAF = TUV. 143, South Africa = Uganda. 143, ZAF = UGA. 144, South Africa = United Arab Emirates. 144, ZAF = ARE. 145, South Africa = United Republic of Tanzania. 145, ZAF = TZA. 146, South Africa = Uruguay. 146, ZAF = URY. 147, South Africa = Uzbekistan. 147, ZAF = UZB. 148, South Africa = Vanuatu. 148, ZAF = VUT. 149, South Africa = Venezuela. 149, ZAF = VEN. 150, South Africa = Viet Nam. 150, ZAF = VNM. 151, South Africa = Yemen. 151, ZAF = YEM. 152, South Africa = Zambia. 152, ZAF = ZMB. 153, South Africa = Zimbabwe. 153, ZAF = ZWE", - "page_start": 45, - "page_end": 45, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Ethical Standards and Code of Conduct\nThe Board and the Company's employees are expected to maintain the highest level of corporate ethics and personal behaviour.\nThe Company has established a Code of Conduct which provides an ethical and legal framework for all employees in the conduct of its business. The Code of Conduct defines how the Company relates to its employees, shareholders and the community in which the Company operates.\nThe core values of the Code of Conduct are:\n〉 honesty and integrity;\n〉 fairness and respect; and\n〉 trust and openness.\nThe Code of Conduct provides clear directions on conducting business internationally, interacting with governments, communities, business partners and general workplace behaviour having regard to the best practice corporate governance models. The Code of Conduct sets out a behavioural framework for all employees in the context of a wide range of ethical and legal issues.\nThe Code of Conduct is published in the 'Corporate Governance' section of the Company's website.", - "page_start": 37, - "page_end": 37, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "II.14. Force majeure\nII.14.1 If a party is affected by force majeure , it must immediately notify the other party, stating the nature of the circumstances, their likely duration and foreseeable effects.\nII.14.2 A party is not liable for any delay or failure to perform its obligations under the FWC if that delay or failure is a result of force majeure . If the contractor is unable to fulfil its contractual obligations owing to force majeure , it has the right to remuneration only for the services actually provided.\n27\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nII.14.3 The parties must take all necessary measures to limit any damage due to force majeure .", - "page_start": 26, - "page_end": 27, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "12 ASX CORPORATE GOVERNANCE COUNCIL BEST PRACTICE RECOMMENDATIONS\nto 40; Directors' Statutory Report. , Compliance = . 9.5, ASX Principle = Provide the information indicated in Guide to reporting on Principle 9.. 9.5, Reference = Items 1 and 9 on pages 47 and 49; Notes 18 and 26 to the Financial Statements.. 9.5, Compliance = Comply. Principle 10: Recognise the legitimate interests of stakeholders, ASX Principle = Principle 10: Recognise the legitimate interests of stakeholders. Principle 10: Recognise the legitimate interests of stakeholders, Reference = Principle 10: Recognise the legitimate interests of stakeholders. Principle 10: Recognise the legitimate interests of stakeholders, Compliance = Principle 10: Recognise the legitimate interests of stakeholders. 10.1, ASX Principle = Establish and disclose a code of conduct to guide compliance with legal and other obligations.. 10.1, Reference = 9. 10.1, Compliance = Comply\nAnnual Report 2004", - "page_start": 37, - "page_end": 37, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Corporate Governance Practices\nThis statement provides an outline of the main corporate governance policies and practices that the Company had in place during the financial year.\nThe Board places considerable importance on high standards of ethical behaviour, governance and accountability. The Board is committed to ensuring its corporate governance policies adhere, as much as is practicable, to the ASX Corporate Governance Council's Corporate Governance Principles and Recommendations.\nThe Board has recognised the need for the continual development of the Company's corporate governance policies and practices, particularly in view of the Australian Securities Exchange Corporate Governance Principles and Recommendations with 2010 Amendments.", - "page_start": 35, - "page_end": 35, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "How much does AWS lambda charge when the function is not running ?", - "target_page": 52, - "target_passage": "there is no charge when your code is not running", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "What is Lambda?\nIn Lambda, you write function code. Lambda runs the functions. That's it. There are no servers.\nWhat is Lambda?\n47\nServerless\nDeveloper Guide\n'No Server Is Easier To Manage Than No Server' - Werner Vogels, VP and CTO\nThe Lambda service runs instances of your function only when needed and scales automatically from zero requests per day to thousands per second. You pay only for the compute time that's actually used - there is no charge when your code is not running.", - "page_start": 50, - "page_end": 51, - "source_file": "serverless-core.pdf" - }, - { - "text": "Securing functions\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. Lambda is fully integrated with IAM, allowing you to control precisely what each Lambda function can do within the AWS Cloud. There are two important things that define the scope of permissions in Lambda functions:\n· resource policy : Defines which events are authorized to invoke the function.\n· execution role policy : Limits what the Lambda function is authorized to do.\nUsing IAM roles to describe a Lambda function's permissions, decouples security configuration from the code. This helps reduce the complexity of a lambda function, making it easier to maintain.\nA Lambda function's resource and execution policy should be granted the minimum required permissions for the function to perform it's task effectively. This is sometimes referred to as the rule of least privilege. As you develop a Lambda function, you expand the scope of this policy to allow access to other resources as required.\nFundamentals\n56\nServerless\nDeveloper Guide", - "page_start": 59, - "page_end": 60, - "source_file": "serverless-core.pdf" - }, - { - "text": "Additional resources\nOfficial AWS documentation:\n· AWS Lambda Developer Guide - extensive and complete documentation for Lambda", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" - }, - { - "text": "Use services instead of custom code\nServerless applications usually comprise several AWS services, integrated with custom code run in Lambda functions. While Lambda can be integrated with most AWS services, the services most commonly used in serverless applications are:", - "page_start": 22, - "page_end": 22, - "source_file": "serverless-core.pdf" - }, - { - "text": "Fundamentals\nServerless solutions are based on event-driven architecture, or EDA, where services send and receive events , which represent an update or change in state. The primary activity of Lambda functions is to process events.\nWithin the Lambda service, your function code is stored in a code package, deployed as a .zip or a container image. All interaction with the code occurs through the Lambda API. There is no direct invocation of functions from outside of the Lambda service.\nWhat you will learn on your journey to building applications with Lambda:\n· How the event-driven programming model invokes Lambda functions\n· How to create, invoke, test, update, package, and secure functions\n· How the execution and runtime environment runs your functions\n· How to view logs and monitor your functions\n· Where to find hands-on opportunities to learn how to invoke functions\nFundamentals\n48\nServerless\nDeveloper Guide", - "page_start": 51, - "page_end": 52, - "source_file": "serverless-core.pdf" - }, - { - "text": "Additional resources\nOfficial AWS documentation:\n· AWS Identity and Access Management Documentation\n· Example IAM identity-based policies - an extensive list of example policies, including AWS Lambda: Allows a lambda function to access an Amazon DynamoDB table which is useful in microservices\n· Grant least privilege section of the Policies and permissions chapter suggests a method to refine permissions for increased security\nResources from the serverless community:\n· Simplifying serverless permissions with AWSAWS SAM Connectors - AWS Compute blog post by Kurt Tometich, Senior Solutions Architect, AWS, from Oct 2022 that introduces a AWS SAM abstraction that creates minimally scoped IAM policies\n· Building AWS Lambda governance and guardrails - AWS Compute blog post by Julian Wood, Senior Solutions Architect, AWS, from Aug 2022 that highlights how Lambda, as a serverless service, simplifies cloud security and compliance so you can concentrate on your business logic.", - "page_start": 49, - "page_end": 49, - "source_file": "serverless-core.pdf" - }, - { - "text": "Common patterns and corresponding AWS services\nQueue, AWS service = Amazon SQS. Event bus, AWS service = EventBridge. Publish/subscribe (fan-out), AWS service = Amazon SNS\nUse services instead of custom code\n19\nServerless\nDeveloper Guide\nOrchestration, AWS service = Step Functions. API, AWS service = API Gateway. Event streams, AWS service = Kinesis\nThese services are designed to integrate with Lambda and you can use infrastructure as code (IaC) to create and discard resources in the services. You can use any of these services via the AWS SDK without needing to install applications or configure servers. Becoming proficient with using these services via code in your Lambda functions is an important step to producing well-designed serverless applications.", - "page_start": 22, - "page_end": 23, - "source_file": "serverless-core.pdf" - }, - { - "text": "Programming Model\nThe Lambda service provides the same event-based programming model for all languages. The Lambda runtime passes an invocation event and context to your Lambda function handler which does some work and produces a resulting event:\nThe invocation event contains data, as a JSON packet, which varies from service to service. For example, API gateway events include path, HTTP method, query string parameters, headers, cookies, and more. DynamoDB events could contain updated or delete record data. S3 events include the bucket name and object key, among other things.\nThe context contains information about the environment the function is running inside. Additional contextual information can be set in familiar environment variables (ENV).\nThe function handler is a method in your function code that processes the inbound event. The handler, which is a standard function in your language of choice, does some work and emits a result event .\nFundamentals\n51\nServerless\nDeveloper Guide\nAfter the handler finishes processing the first event, the runtime sends it another, and another. Each instance of your function could process thousands of requests.\nUnlike traditional servers, Lambda functions do not run constantly. When a function is triggered by an event, this is called an invocation . Lambda functions are limited to 15 minutes in duration, but on average, across all AWS customers, most invocations last for less than a second.\nThere are many types of invocation events. Some examples:\n· HTTP request from API Gateway\n· Schedule managed by an EventBridge rule\n· Message from an IOT device\n· Notification that a file was uploaded to an S3 bucket\nEven the smallest Lambda-based application uses at least one event that invokes your function.", - "page_start": 54, - "page_end": 55, - "source_file": "serverless-core.pdf" - }, - { - "text": "Deploy with containers\nIf you need a custom runtime that is not provided by AWS, you can create and deploy a custom container image. AWS provides base images preloaded with a language runtime and other components that are required to run the image on Lambda. AWS provides a Dockerfile for each of the base images to help with building your container image.\nCustom containers are one way you might experiment with lift and shift of existing code to Lambda runtimes. If you do this, consider the architectural differences between always running containers, versus on demand nature of Lambda functions.", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" - }, - { - "text": "Related resources:\n· Datadog Lambda Extension - an extension that supports submitting custom metrics, traces, and logs asynchronously while your Lambda function executes.\n· Lambda Extensions - official documentation", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "What is the role of resource policies of lambda functions ?", - "target_page": 60, - "target_passage": "resource policy: Defines which events are authorized to invoke the function.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Securing functions\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. Lambda is fully integrated with IAM, allowing you to control precisely what each Lambda function can do within the AWS Cloud. There are two important things that define the scope of permissions in Lambda functions:\n· resource policy : Defines which events are authorized to invoke the function.\n· execution role policy : Limits what the Lambda function is authorized to do.\nUsing IAM roles to describe a Lambda function's permissions, decouples security configuration from the code. This helps reduce the complexity of a lambda function, making it easier to maintain.\nA Lambda function's resource and execution policy should be granted the minimum required permissions for the function to perform it's task effectively. This is sometimes referred to as the rule of least privilege. As you develop a Lambda function, you expand the scope of this policy to allow access to other resources as required.\nFundamentals\n56\nServerless\nDeveloper Guide", - "page_start": 59, - "page_end": 60, - "source_file": "serverless-core.pdf" - }, - { - "text": "Fundamentals\nServerless solutions are based on event-driven architecture, or EDA, where services send and receive events , which represent an update or change in state. The primary activity of Lambda functions is to process events.\nWithin the Lambda service, your function code is stored in a code package, deployed as a .zip or a container image. All interaction with the code occurs through the Lambda API. There is no direct invocation of functions from outside of the Lambda service.\nWhat you will learn on your journey to building applications with Lambda:\n· How the event-driven programming model invokes Lambda functions\n· How to create, invoke, test, update, package, and secure functions\n· How the execution and runtime environment runs your functions\n· How to view logs and monitor your functions\n· Where to find hands-on opportunities to learn how to invoke functions\nFundamentals\n48\nServerless\nDeveloper Guide", - "page_start": 51, - "page_end": 52, - "source_file": "serverless-core.pdf" - }, - { - "text": "Related resource:\n· Creating and sharing Lambda layers", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" - }, - { - "text": "Programming Model\nThe Lambda service provides the same event-based programming model for all languages. The Lambda runtime passes an invocation event and context to your Lambda function handler which does some work and produces a resulting event:\nThe invocation event contains data, as a JSON packet, which varies from service to service. For example, API gateway events include path, HTTP method, query string parameters, headers, cookies, and more. DynamoDB events could contain updated or delete record data. S3 events include the bucket name and object key, among other things.\nThe context contains information about the environment the function is running inside. Additional contextual information can be set in familiar environment variables (ENV).\nThe function handler is a method in your function code that processes the inbound event. The handler, which is a standard function in your language of choice, does some work and emits a result event .\nFundamentals\n51\nServerless\nDeveloper Guide\nAfter the handler finishes processing the first event, the runtime sends it another, and another. Each instance of your function could process thousands of requests.\nUnlike traditional servers, Lambda functions do not run constantly. When a function is triggered by an event, this is called an invocation . Lambda functions are limited to 15 minutes in duration, but on average, across all AWS customers, most invocations last for less than a second.\nThere are many types of invocation events. Some examples:\n· HTTP request from API Gateway\n· Schedule managed by an EventBridge rule\n· Message from an IOT device\n· Notification that a file was uploaded to an S3 bucket\nEven the smallest Lambda-based application uses at least one event that invokes your function.", - "page_start": 54, - "page_end": 55, - "source_file": "serverless-core.pdf" - }, - { - "text": "What is Lambda?\nIn Lambda, you write function code. Lambda runs the functions. That's it. There are no servers.\nWhat is Lambda?\n47\nServerless\nDeveloper Guide\n'No Server Is Easier To Manage Than No Server' - Werner Vogels, VP and CTO\nThe Lambda service runs instances of your function only when needed and scales automatically from zero requests per day to thousands per second. You pay only for the compute time that's actually used - there is no charge when your code is not running.", - "page_start": 50, - "page_end": 51, - "source_file": "serverless-core.pdf" - }, - { - "text": "Related resources:\n· Datadog Lambda Extension - an extension that supports submitting custom metrics, traces, and logs asynchronously while your Lambda function executes.\n· Lambda Extensions - official documentation", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - }, - { - "text": "How to process events with a Lambda handler\nConceptually, there are only three steps to processing events with Lambda:\n1. Configure the entry point to your function, known as the handler , and deploy the function.\n2. Lambda service initializes the function, then it invokes the handler with an invocation event and context.\n3. Your handler function processes the event and returns a response event.\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle, the function stays in memory, so clients and variables declared outside of the handler method can be reused.\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety of reasons; some examples: scaling down to conserve resources, updating the function, updating the runtime.\nThe function handler is the essential component of your function code. As noted previously, the handler is the entry point, but it may not be the only function in your code. In fact, a best practice is keeping the handler sparse and doing the actual processing in other functions in your code.\nHere are some example handlers :", - "page_start": 56, - "page_end": 56, - "source_file": "serverless-core.pdf" - }, - { - "text": "Related resource:\n· Event source mapping official documentation, including the default behavior that batches records together into a single payload that Lambda sends to your function.\nAdvanced Topics\n57\nServerless\nDeveloper Guide", - "page_start": 60, - "page_end": 61, - "source_file": "serverless-core.pdf" - }, - { - "text": "Secure\n· Execution role\nFundamentals\n50\nServerless\nDeveloper Guide\n· Policies that grant least privilege to your functions\nWorkshop - Intro to Serverless - Before diving too deep, you can choose to try out serverless in a workshop or tutorial. Connect to a data source and create a REST API with your first Lambda function.'\n· Services used: AWS Management Console, Lambda, DynamoDB, API Gateway", - "page_start": 53, - "page_end": 54, - "source_file": "serverless-core.pdf" - }, - { - "text": "Connect to functions with Function URLs\nA function URL is a dedicated HTTP(S) endpoint for your Lambda function. You can create and configure a function URL through the Lambda console or the Lambda API. When you create a function URL, Lambda automatically generates a unique URL endpoint for you. Once you create a function URL, its URL endpoint never changes. Function URL endpoints have the following format:\nhttps://.lambda-url..on.aws\nAfter you configure a function URL for your function, you can invoke your function through its HTTP(S) endpoint with a web browser, curl, Postman, or any HTTP client.\nRelated resources:\n· Function URLs - official documentation", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "Why can't I use SnapStart on my function tagged with $LATEST ?", - "target_page": 63, - "target_passage": " You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Launch functions faster with SnapStart\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, typically with no changes to your function code. The largest contributor to startup latency (often referred to as cold start time) is the time that Lambda spends initializing the function, which includes loading the function's code, starting the runtime, and initializing the function code.\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda takes a Firecracker microVM snapshot of the memory and disk state of the initialized execution environment, encrypts the snapshot, and caches it for low-latency access.\nNote: You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST).", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - }, - { - "text": "Related resources:\n· Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by Jeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly six seconds init time to 142 milliseconds of restore time with SnapStart\nAdvanced Topics\n59\nServerless\nDeveloper Guide", - "page_start": 62, - "page_end": 63, - "source_file": "serverless-core.pdf" - }, - { - "text": "Starting the servers\nServers are started by running STRTCPSVR *ONDMD . The INSTANCE parameter of the STRTCPSVR *ONDMD command supports the special values of *DFT , *ALL , and *AUTOSTART , and the specification of the name of an instance. (An instance is set to autostart if the ars.cfg file for that instance contains ARS_AUTOSTART_INSTANCE=1 .) The default value for the INSTANCE parameter is *DFT . You can also create a data area that is named STRTCPSVR to further control the behavior of the STRTCPSVR command. For more information about the data area, see the IBM Content Manager OnDemand for i - Common Server Administration Guide , SC19-2792.\nWithout the STRTCPSVR data area, the values of *DFT and *AUTOSTART work identically. All instances that are set to autostart are started. Use the special value *ALL to start all of the instances that are configured on the system. You can also specify the name of a single instance to start, for example:\nSTRTCPSVR SERVER(*ONDMD) INSTANCE(ONDTEST)\nWith the data area, the value of *DFT starts only the instance that is named in the data area. The data area must be named STRTCPSVR and in library QUSRRDARS . The data area must be of the type character with a length of 10. To create the data area, run the following command (all as one command):\nCRTDTAARA DTAARA(QUSRRDARS/STRTCPSVR) TYPE(*CHAR) LEN(10) VALUE(QUSROND) TEXT('Autostart instance name for STRTCPSVR *ONDMD *DFT')\nQUSROND is the name of the instance to start.\nThe special values *ALL and *AUTOSTART work the same with the data area as without the data area.\nTo determine the instances that are started when STRTCPSVR SERVER(*ONDMD) INSTANCE(*AUTOSTART) is run, you can look for the ARS_AUTOSTART_INSTANCE=1 in the ARS.CFG file. However, an easier way is available so that you do not need to check the ARS.CFG file for every instance.", - "page_start": 57, - "page_end": 57, - "source_file": "sg246915.pdf" - }, - { - "text": "13.9.2 Collecting logs using the CLI\n5. Click in the Filter box and enter snap to see a list of snap files, as shown in Figure 13-72. Locate the exact name of the snap that was generated by using the svc_snap command that was issued earlier. Select that file, and click Download .\nFigure 13-72 Filtering on snap to download\n6. Save the file to a folder of your choice on your workstation.", - "page_start": 753, - "page_end": 753, - "source_file": "sg247938.pdf" - }, - { - "text": "Advanced Topics\nYou can do a lot by just creating a function and connecting it to an event source like API Gateway or S3 triggers.\nAs you progress on your journey, you should explore the following more advanced topics.\n· Connect services with event source mapping\n· Deploy code in containers\n· Add additional code with layers\n· Augment functions with extensions\n· Launch functions faster with SnapStart\n· Connect to functions with Function URLs", - "page_start": 60, - "page_end": 60, - "source_file": "serverless-core.pdf" - }, - { - "text": "* Image Streams and Image Stream Tags [is,istag]:\nAn image stream groups sets of related images under tags - analogous to a branch in a source code repository. Each image stream may have one or more tags (the default tag is called \"latest\") and those tags may point at external Docker registries, at other tags in the same stream, or be controlled to directly point at known images. In addition, images can be pushed to an image stream tag directly via the integrated Docker registry.", - "page_start": 164, - "page_end": 164, - "source_file": "sg248459.pdf" - }, - { - "text": "Starting the servers\nTable 2-1 Behavior of the STRTCPSVR command with or without the STRCPSVR data\nWithout the data area, *DFT = All instances set to autostart. Without the data area, *ALL = All instances that are configured on the system. Without the data area, *AUTOSTART = All instances set to autostart. Without the data area, Named instance = The named instance. With the data area, *DFT = Only the instance that is named in the data area. With the data area, *ALL = All instances that are configured on the system. With the data area, *AUTOSTART = All instances set to autostart. With the data area, Named instance = The named instance", - "page_start": 58, - "page_end": 58, - "source_file": "sg246915.pdf" - }, - { - "text": "13.9.2 Collecting logs using the CLI\nThe CLI can be used to collect and upload a support package as requested by IBM Support by performing the following steps:\n1. Log in to the CLI and issue the svc_snap command that matches the type of snap requested by IBM Support:\n- Standard logs (type 1):\nsvc_snap upload pmr=ppppp,bbb,ccc gui1\n- Standard logs plus one existing statesave (type 2):\nsvc_snap upload pmr=ppppp,bbb,ccc gui2\n- Standard logs plus most recent statesave from each node (type 3):\nsvc_snap upload pmr=ppppp,bbb,ccc gui3\n- Standard logs plus new statesaves:\nsvc_livedump -nodes all -yes svc_snap upload pmr=ppppp,bbb,ccc gui3\n2. We collect the type 3 (option 3) and have it automatically uploaded to the PMR number that is provided by IBM Support, as shown in Example 13-6.\nExample 13-6 The svc_snap command\nssh superuser@9.173.156.250 Password: IBM_Storwize:ITSO-V7k:superuser> svc_snap upload pmr=12345,000,866 gui3\n3. If you do not want to automatically upload the snap to IBM, do not specify the upload pmr=ppppp,bbb,ccc part of the commands. When the snap creation completes, it creates a file named that uses the following format:\n/dumps/snap..YYMMDD.hhmmss.tgz\nIt takes a few minutes for the snap file to complete (longer if statesaves are included).\n4. The generated file can then be retrieved from the GUI clicking Settings → Support → Manual Upload Instructions twisty → Download Support Package and then, clicking Download Existing Package , as shown in Figure 13-71.\nFigure 13-71 Downloaded Existing Package\nChapter 13. RAS, monitoring, and troubleshooting\n731", - "page_start": 751, - "page_end": 752, - "source_file": "sg247938.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\n˙ Na ( t ) = R (1 -A 0 + A 1 -A 2) -( γ a + γ ' a ) Na ( t ) -g [ M † ( t ) a ( t ) + a † ( t ) M ( t )] + Fa ( t ) , (4)\n˙ Nb ( t ) = -R ( B 0 -B 1 + B 2) -γ bNb ( t ) + γ ' a Na ( t ) + g [ a † ( t ) M ( t ) + M † ( t ) a ( t )] + Fb ( t ) , (5)\n˙ M ( t ) = -R ( C 0 -C 1 + C 2) -γ abM ( t ) + g [ Na ( t ) -Nb ( t )] a ( t ) + FM ( t ) , (6)\nwhere the macroscopic noise operators are defined as\nFa ( t ) = ∑ j ˙ Γ j ( t ) σ j a ( t ) -R (1 -A 0 + A 1 -A 2) + ∑ j Γ j ( t ) f j a ( t ) ,\nFb ( t ) = ∑ j ˙ Γ j ( t ) σ j b ( t ) + R ( B 0 -B 1 + B 2) + ∑ j Γ j ( t ) f j b ( t ) ,\nFM ( t ) = -i ∑ j ˙ Γ j ( t ) ˜ σ j -( t ) + R ( C 0 -C 1 + C 2) -i ∑ j Γ j ( t ) f j σ ( t ) ,\nwith A 0 = 〈 σ j a ( t j + τ ) 〉 q , A 1 = 〈 σ j a ( t j + τ + T ) 〉 q , A 2 = 〈 σ j a ( t j + 2 τ + T ) 〉 q , B 0 = 〈 σ j b ( t j + τ ) 〉 q , B 1 = 〈 σ j b ( t j + τ + T ) 〉 q , B 2 = 〈 σ j b ( t j + 2 τ + T ) 〉 q , C 0 = 〈 -i σ j -( t j + τ ) 〉 q , C 1 = 〈 -i σ j -( t j + τ + T ) 〉 q ,", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" - }, - { - "text": "2.3. Hashtags as Frame Vehicles on Social Media\nLarge amounts of unprompted user-generated data on social media serve as distributed sensors that better reflect public opinion [50] and o GLYPH<11> er researchers more accurate insight into the associations of concepts in people's minds [51]. In particular, hashtags, a unique mechanism of social media, provide researchers with an unprecedented chance to accurately extract the public cognitive framework contained in texts. To inform or comment [52], social media users attach user-generated tagging with a hash character '#' to anchor the keywords of their tweet and classify the tweet to a unifying topic, and other users can view hashtags as beacons to follow specific topics and join collective discussions. Asacommunicative marker, hashtags have been used in a wide range of cases [53] and have contributed considerably to conversations and social participation [54,55]. In addition to the function as a topical signifier [56], social scientists noted that hashtags can also represent the context of a tweet [57], flag an individual's community membership [58], or indicate shared interests [59]. Several studies adopted hashtags as frame markers for both content and sentiment analysis [60-65] to eliminate researchers' subjectivity in frame detection.\nIn some cases, social media users have long struggled to define the most appropriate hashtag for certain events [60,66]. By observing the usage pattern of trending hashtags '#CrimingWhileWhite' and '#AliveWhileBlack' in a struggle against racism, [67] discovered that two related hashtags generated in a single event will draw public attention to di GLYPH<11> erent sides of a story and cause noticeable structural and linguistic di GLYPH<11> erences in public discourse.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "At Shentel company, what determines an employees pension ?", - "target_page": 22, - "target_passage": "Pension benefits are based primarily on the employee's compensation and years of service", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SHENTEL SERVICE AREAS", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Pension Benefits\nWe offer contributory and non-contributory defined benefit pension plans that provide employees with a lifetime monthly pension on retirement.\n98 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nWe separately calculate our net obligation for each defined benefit plan by estimating the amount of future benefits that employees have earned in return for their service in the current and prior years, and discounting those benefits to determine their present value.\nWe accrue our pension plan obligations as employees provide the services necessary to earn the pension. We use a discount rate based on market yields on high quality corporate bonds at the measurement date to calculate the accrued pension benefit obligation. Remeasurements of the accrued pension benefit obligation are determined at the end of the year, and include actuarial gains and losses, return on plan assets and any change in the effect of the asset ceiling. These are recognized in other comprehensive income and retained earnings.\nThe cost of pensions is actuarially determined and takes into account the following assumptions and methods for pension accounting related to our defined benefit plans:\nGLYPH<129> the expected rates of salary increases for calculating increases in future benefits\nGLYPH<129> mortality rates for calculating the life expectancy of plan members, and\nGLYPH<129> past service costs from plan amendments are immediately expensed in net income.\nWe recognize contributions to defined contribution plans as an employee benefit expense in operating costs in the consolidated statements of income in the periods the employees provide the related services.\nSee note 22 for more information about our pension plans.", - "page_start": 101, - "page_end": 101, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Retirement Benefits\nThe Company has defined contribution profit-sharing plans covering substantially all employees who are not participants in certain defined benefit plans. The Company's annual contribution to the defined contribution plans is based on employee eligible earnings and results of operations and amounted to $26,489,000, $23,524,000, and $24,826,000 in 2003, 2002, and 2001, respectively.\nThe Company sponsors defined benefit plans which include a limited number of salaried and hourly employees at certain subsidiaries. The Company's funding policy is generally to contribute annually the minimum actuarially computed amount. Net pension costs relating to these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, respectively. The actuarial present value of obligations, less related plan assets at fair value, is not significant.\nThe Company also participates in a multiemployer plan, which provides defined benefits to certain of the Company's union\nemployees. Pension expense for this plan amounted to $309,000, $309,000, and $310,000 in 2003, 2002, and 2001, respectively.", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "12. PENSION AND PROFIT SHARING PLANS:\nThe Company has a defined benefit pension plan covering substantially all of its employees. The benefits are based on years of service and a percentage of the employee's qualifying compensation during the final years of employment. The Company's funding policy is to contribute annually the amount necessary to satisfy the Internal Revenue Service's funding standards. Contributions are intended to provide not only for benefits attributed to service to date but also for those expected to be earned in the future.\nF-21", - "page_start": 84, - "page_end": 84, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Purchase of Annuities\nFrom time to time we have made additional lump-sum contributions to our pension plans, and the pension plans have purchased annuities from insurance companies to fund the pension benefit obligations for certain groups of retired employees in the plans. Purchasing the annuities relieves us of our primary responsibility for that portion of the accrued benefit obligations for the retired employees and eliminates the significant risk associated with the obligations.\nWe did not make any additional lump-sum contributions to our pension plans in 2013 or 2012, and the pension plans did not purchase additional annuities.", - "page_start": 65, - "page_end": 65, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "NOTE 22: PENSIONS\nWe have contributory and non-contributory defined benefit pension plans that are made available to most of our employees. The plans provide pensions based on years of service, years of contributions and earnings. We do not provide any non-pension post-retirement benefits. We also provide unfunded supplemental pension benefits to certain executives.\nThe assets of the defined benefit pension plans are held in segregated accounts isolated from our assets. We administer the defined benefit pension plans pursuant to applicable regulations, the Statement of Investment Policies and Procedures and to the mandate of the Pension Committee of the Board of Directors. The Pension Committee of the Board of Directors oversees our administration of the defined benefits pension plans, which includes the following principal areas:\nGLYPH<129> overseeing the funding, administration, communication and investment management of the plans\nGLYPH<129> selecting and monitoring the performance of all third parties performing duties in respect of the plans, including audit, actuarial and investment management services\nGLYPH<129> proposing, considering and approving amendments to the defined benefit pension plans\nGLYPH<129> proposing, considering and approving amendments of the Statement of Investment Policies and Procedures\nGLYPH<129> reviewing management and actuarial reports prepared in respect of the administration of the defined benefit pension plans\nGLYPH<129> reviewing and approving the audited financial statements of the defined benefit pension plan funds.\nThe assets of the defined benefit pension plans are invested and managed following all applicable regulations and the Statement of Investment Policies and Procedures, and reflect the characteristics and asset mix of each defined benefit pension plan. Investment and market return risk is managed by:\nGLYPH<129> contracting professional investment managers to execute the investment strategy following the Statement of Investment Policies and Procedures and regulatory requirements\nGLYPH<129> specifying the kinds of investments that can be held in the plans and monitoring compliance\nGLYPH<129> using asset allocation and diversification strategies, and\nGLYPH<129> purchasing annuities from time to time.\nThe funded pension plans are registered with the Office of the Superintendent of Financial Institutions and are subject to the Federal Pension Benefits Standards Act. The plans are also registered with the Canada Revenue Agency and are subject to the Canada Income Tax Act. The benefits provided under the plans and the contributions to the plans are funded and administered in accordance with all applicable legislation and regulations.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "We must serve well to prosper - We must prosper to serve well\nShenTel Service Company · Shenandoah Long Distance Company · Shenandoah Mobile Company Shenandoah Network Company · Shenandoah Telephone Company · Shenandoah Valley Leasing Company Shenandoah Cable Television Company · ShenTel Communications Company\nShenandoah Personal Communications Company\nPO Box 459 Edinburg, VA 22824-0459 Phone 540-984-4141 · Fax 540-984-8192\nwww.shentel.com\nThe front cover of the annual report is adapted from the Company's 2004 Telephone Directory.", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "NOTE 12 - EMPLOYEE BENEFIT PLANS\nEmployees of the Company who are members of various unions are covered by union-sponsored, collectively bargained, multi-employer health and welfare and defined benefit pension plans. The Company recorded an expense of $86 million in 2004, $77 million in 2003 and $66 million in 2002 under such plans. The plans' sponsors have not provided sufficient information to permit the Company to determine its share of unfunded vested benefits, if any.\nThe Company is self-insured for most health care benefits for its non-union employees. The liability for claims filed and estimates of claims incurred but not reported is included in the 'Other accrued liabilities' caption in the accompanying consolidated balance sheets.\nThe Company has a retirement savings plan under Section 401(k) of the Internal Revenue Code for eligible employees not covered by a collective bargaining agreement that does not specifically provide for participation in the plan. The plans allow employees to defer, within prescribed limits, up to 30% of their income on a pre-tax basis through contributions to the plans. The Company matches, within prescribed limits, a portion of eligible employees' contributions. In the case of certain union employees, the Company contributes to the plan are based on hours worked. The Company recorded charges for 401(k) contributions of $12 million in 2004, $10 million in 2003 and $12 million in 2002.\nThe Company maintains a nonqualified deferred retirement plan for certain key employees. The plan allows participants to defer, on a pre-tax basis, a portion of their salary and bonus and accumulate tax deferred earnings, plus investment earnings on the deferred balances, as a retirement fund. Participants receive a Company match of up to 4% of salary, net of any Company match received under the Company's 401(k) plan. All employee deferrals vest immediately. The Company matching contributions vest ratably over a three-year period. The Company recorded charges for matching contributions of $1 million in 2004, $2 million in 2003 and $1 million in 2002.\n63\n64\nNotes to Consolidated Financial Statements", - "page_start": 72, - "page_end": 73, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "9. RETIREMENT BENEFIT PLANS\nThe Company and its domestic consolidated subsidiaries have defined benefit plans, i.e., welfare pension fund plans ('WPFP'), tax-qualified pension plans and lump-sum payment plans, covering substantially all employees who are entitled to lump-sum or annuity payments, the amounts of which are determined by reference to their basic rates of pay, length of service, and the conditions under which termination occurs. Certain foreign consolidated subsidiaries have defined benefit and contribution plans.\nThe following table sets forth the funded and accrued status of the plans, and the amounts recognized in the consolidated balance sheets as of March 31, 2005 and 2004 for the Company's and the consolidated subsidiaries' defined benefit plans:", - "page_start": 83, - "page_end": 83, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "NOTE 22: PENSIONS\nSignificant estimates are involved in determining pension related balances. Actuarial estimates are based on projections of employees' compensation levels at the time of retirement. Maximum retirement benefits are primarily based on career average earnings, subject to certain adjustments. The most recent actuarial valuations were completed as at January 1, 2013.\n118 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nThe table below sets out the estimated present value of accrued plan benefits and the estimated market value of the net assets available to provide these benefits for our funded plans at December 31, 2013 and 2012.\nPlan assets, at fair value, 2013 = $ 1,037. Plan assets, at fair value, 2012 = $ 833. Accrued benefit obligations, 2013 = 1,209. Accrued benefit obligations, 2012 = 1,167. Deficiency of plan assets over accrued benefit obligations, 2013 = (172). Deficiency of plan assets over accrued benefit obligations, 2012 = (334). Effect of asset ceiling limit, 2013 = (9). Effect of asset ceiling limit, 2012 = -. Net deferred pension liability, 2013 = $ (181). Net deferred pension liability, 2012 = $ (334). Consists of:, 2013 = . Consists of:, 2012 = . Deferred pension asset, 2013 = $ 8. Deferred pension asset, 2012 = $ 9. Deferred pension liability, 2013 = (189). Deferred pension liability, 2012 = (343). Net deferred pension liability, 2013 = $ (181). Net deferred pension liability, 2012 = $ (334)\nThe table below shows our pension fund assets for the years ended 2013 and 2012.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "At the end of 2003, how many available-for-sales investments did Shenandoah company count in its portfolio ?", - "target_page": 53, - "target_passage": "The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "We must serve well to prosper - We must prosper to serve well\nShenTel Service Company · Shenandoah Long Distance Company · Shenandoah Mobile Company Shenandoah Network Company · Shenandoah Telephone Company · Shenandoah Valley Leasing Company Shenandoah Cable Television Company · ShenTel Communications Company\nShenandoah Personal Communications Company\nPO Box 459 Edinburg, VA 22824-0459 Phone 540-984-4141 · Fax 540-984-8192\nwww.shentel.com\nThe front cover of the annual report is adapted from the Company's 2004 Telephone Directory.", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Significant Transactions\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the Virginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with Verizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated an analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, Rappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus the Company's 66% share of the partnership's working capital, which was approximately $1.7 million. The Company was required to do a working capital true up following the closing, from which the Company recorded a charge for $23 thousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to reflect the consolidated effective tax rate based on the final operating results for the year.\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the results of operations for the two months of 2003 that the operation remained a part of the Company.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n40\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nReflected in the 2003 results are several unusual items, which should be noted in understanding the financial results of the Company for 2003.", - "page_start": 41, - "page_end": 42, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 14. Segment Reporting\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on the products and services each provides. Each segment is managed and evaluated separately because of differing technologies and marketing strategies.\nThe reporting segments and the nature of their activities are as follows:\nShenandoah Telecommunications Company (Holding), 1 = Holding company, which invests in both affiliated and non-affiliated companies.. Shenandoah Telephone Company (Telephone), 1 = Provides both regulated and unregulated telephone services and leases fiber optic facilities primarily throughout the Northern Shenandoah Valley.. Shenandoah Cable Television Company (CATV), 1 = Provides cable television service in Shenandoah County.. ShenTel Service Company (ShenTel), 1 = Provides Internet access to a multi-state region surrounding the Northern Shenandoah Valley, hosts Travel 511 for Virginia, and sells and services telecommunication equipment.. Shenandoah Valley Leasing Company (Leasing), 1 = Finances purchases of telecommunications. Shenandoah Mobile Company (Mobile), 1 = Provides tower rental space in the Company's PCS markets and paging services throughout the Northern Shenandoah Valley.. Shenandoah Long Distance Company (Long Distance), 1 = Provides long distance services.. Shenandoah Network Company (Network), 1 = Leases interstate fiber optic facilities.. ShenTel Communications Company (Shen Comm), 1 = Provides DSL services as a CLEC operation.. Shenandoah Personal Communications Company (PCS), 1 = As a PCS Affiliate of Sprint, provides digital wireless service to a portion of a four-state area covering the region from Harrisburg, York and Altoona, Pennsylvania, to Harrisonburg, Virginia.\nThe accounting policies of the segments are the same as those described in the summary of significant accounting policies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties.\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows:", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 3. Securities and Investments (Continued)\nIn 2003, the Company received distributions from its equity investments totaling $0.5 million in cash and invested $0.7 million in two equity investments, Dolphin Communications Parallel Fund, LP and Dolphin Communications Fund II, LP. These two investments recorded losses of approximately $0.4 million for the 2003 year. The Company recorded a loss from the Virginia Independent Telephone Alliance investment of $19 thousand, for 2003. The Company recorded a gain from the ValleyNet partnership of $84 thousand and received distributions of $84 thousand. Other equity investments lost an additional $0.4 million for 2003.\nThe Company was committed to invest an additional $1.8 million at December 31, 2003 in various equity method investees pursuant to capital calls from the fund managers. It is not practical to estimate the fair value of the other investments due to their limited market and restrictive nature of their transferability.\nThe Company's ownership interests in Virginia Independent Telephone Alliance and ValleyNet are approximately 22% and 20%, respectively. The Company purchases services from Virginia Independent Telephone Alliance and ValleyNet at rates comparable with other customers. The Company's ownership in NTC Communications is approximately 18%. Other equity method investees are investment limited partnerships which are approximately 2% owned each.\n25\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS", - "page_start": 26, - "page_end": 27, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nis the intent of the Company to evaluate whether to hold or sell parts or all of each investment on an individual basis. At December 31, 2003, the Company had external investments totaling $7.5 million.\nIn 2004, the Company anticipates taking advantage of a conversion feature on its Rural Telephone Bank stock. The Company will convert a portion of its holdings into a different class of stock that will pay cash dividends each year. The bank declares a dividend rate that varies, each year. The range of the dividend has been between 4.2% and 5.65% over the last 5 years. The rate in the two most recent years was 4.2%. This transaction is estimated to provide the Company with approximately $0.3 million in dividend income each year, based on the 2003 dividend rate of 4.2% and assuming we had converted the stock at the beginning of 2003.", - "page_start": 53, - "page_end": 53, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "OUR BUSINESS\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides various telecommunications services through its operating subsidiaries. These services include: wireline telephone service, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in Virginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; online information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of Virginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern Shenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; wireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, Virginia to the Harrisburg, York and Altoona, Pennsylvania markets.", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "INDEPENDENT AUDITOR'S REPORT\nThe Board of Directors and Shareholders Shenandoah Telecommunications Company:\nWe have audited the accompanying consolidated balance sheets of Shenandoah Telecommunications Company and subsidiaries (the Company), as of December 31, 2003, 2002, and 2001, and the related consolidated statements of income, shareholders' equity and comprehensive income, and cash flows for the years then ended. These consolidated financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these consolidated financial statements based on our audits.\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the consolidated financial statements referred to above present fairly, in all material respects, the financial position of Shenandoah Telecommunication s Company and subsidiaries as of December 31, 2003, 2002 and 2001, and the results of their operations and their cash flows for the years then ended, in conformity with accounting principles generally accepted in the United States of America.\nAs discussed in note 1 to the consolidated financial statements, the Company changed its method of accounting for goodwill in 2002. As further discussed in note 1 to the consolidated financial statements, the Company changed its method of accounting for asset retirement obligations in 2003.\nRichmond, Virginia February 6, 2004\n11\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES CONSOLIDATED BALANCE SHEETS", - "page_start": 12, - "page_end": 13, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 3. Securities and Investments\nThe Company has three classifications of investments; available for sale securities, investments carried at cost, and equity method investments. See Note 1 for specific definitions of each classification of investment. The following tables present the investments of the Company for the three-year period ended December 31, 2003:\nAvailable-for-sale securities at December 31 consist of the following:", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 3. Securities and Investments\nDuring 2001, the Company liquidated its holdings of Loral Space and Communications, LTD and ITC^DeltaCom, Inc. for proceeds of $0.2 million and a realized loss of $1.4 million. Additionally, the Company sold 130,000 shares of Illuminet Holdings, Inc. (Illuminet) for proceeds of $5.3 million and a realized gain of $5.0 million. In September 2001, Illuminet notified the Company that VeriSign, Inc. (VeriSign) made an offer to acquire Illuminet. The Company received VeriSign stock valued at $13.2 million, for the Illuminet investment, and based on the fair value of the new asset received, recorded a realized gain of $12.7 million in 2001 on the transaction through net gain on investments in the other income (expense) section of the income statement. Subsequent to the close of the transaction, the VeriSign stock declined in value and the Company recognized an impairment of $1.5 million, as management viewed the decline to be other than temporary.\nIn 2002, the Company liquidated its holdings of VeriSign, Inc, for proceeds of $2.8 million and a realized loss of $9.0 million. The VeriSign stock was valued at $38 per share at December 31, 2001, and declined over the ensuing months to approximately $6 per share in early July 2002. The Company liquidated all of its holdings in the stock early in the third quarter 2002. The Company's original investment in VeriSign's predecessor companies was approximately $1.0 million. Total proceeds from all sales of stock in VeriSign and its predecessor companies were $8.1 million, or more than eight times the original investment. .\nThere were no gross realized gains on available-for-sale securities included in income in 2003 or 2002, while there were $17.7 million for 2001. Gross realized losses included in income in 2003, 2002 and 2001 were $3 thousand, $9.0 million and $3.0 million, respectively.\nChanges in the unrealized gains (losses) on available-for-sale securities during the years ended December 31, 2003, 2002 and 2001 reported as a separate component of shareholders' equity are as follows:\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n24\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS", - "page_start": 25, - "page_end": 26, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "LIQUIDITY AND CAPITAL RESOURCES\nDuring 2003, the Company expended $4.9 million for the purchase of the Company's common stock. Included in this amount was $4.1 million in April 2003 for the completion of a tender offer in which a total of 173,614 shares of common stock were repurchased at a price of $23.00 per share. During the fourth quarter of 2003, the Company repurchased the following shares of the Company's common stock:\nTotal Number of Shares Purchased, OCTOBER 2003 = 8,400. Total Number of Shares Purchased, NOVEMBER 2003 = 11,800. Total Number of Shares Purchased, TOTAL = 20,200. Average Price Paid Per Share, OCTOBER 2003 = $42.42. Average Price Paid Per Share, NOVEMBER 2003 = $41.02. Average Price Paid Per Share, TOTAL = $41.60. Total Number of Shares Purchased, OCTOBER 2003 = . Total Number of Shares Purchased, NOVEMBER 2003 = . Total Number of Shares Purchased, TOTAL = . As Part of Publicly Announced Plan or Program, OCTOBER 2003 = 8,400. As Part of Publicly Announced Plan or Program, NOVEMBER 2003 = 11,800. As Part of Publicly Announced Plan or Program, TOTAL = 20,200. Maximum Number of Shares That May Yet Be Purchased Under Plan or Program (a), OCTOBER 2003 = 105,800. Maximum Number of Shares That May Yet Be Purchased Under Plan or Program (a), NOVEMBER 2003 = 94,000. Maximum Number of Shares That May Yet Be Purchased Under Plan or Program (a), TOTAL = 94,000\n(a) This program was announced in April 2000 and initially provided for 200,000 shares to be repurchased.\nThe Company received net proceeds of $2.7 million for the exercise of employee stock options during 2003.\nIn September 2003, the Company announced that its Board of Directors had approved a policy for the payment of regular quarterly cash dividends on the Company's common stock. During 2003 the Company paid dividends totaling $406,000 to its stockholders.\nThe table below summarizes debt, lease and other minimum contractual obligations outstanding at December 31, 2003:", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "What was the main reason of the decrease of customer base of the Shenandoah and Virginia 10 RSA partnership ?", - "target_page": 51, - "target_passage": "he decline was the result of competition with digital technologies and increased competition from national carriers in the area", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "We must serve well to prosper - We must prosper to serve well\nShenTel Service Company · Shenandoah Long Distance Company · Shenandoah Mobile Company Shenandoah Network Company · Shenandoah Telephone Company · Shenandoah Valley Leasing Company Shenandoah Cable Television Company · ShenTel Communications Company\nShenandoah Personal Communications Company\nPO Box 459 Edinburg, VA 22824-0459 Phone 540-984-4141 · Fax 540-984-8192\nwww.shentel.com\nThe front cover of the annual report is adapted from the Company's 2004 Telephone Directory.", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "OUR BUSINESS\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides various telecommunications services through its operating subsidiaries. These services include: wireline telephone service, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in Virginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; online information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of Virginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern Shenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; wireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, Virginia to the Harrisburg, York and Altoona, Pennsylvania markets.", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 14. Segment Reporting\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on the products and services each provides. Each segment is managed and evaluated separately because of differing technologies and marketing strategies.\nThe reporting segments and the nature of their activities are as follows:\nShenandoah Telecommunications Company (Holding), 1 = Holding company, which invests in both affiliated and non-affiliated companies.. Shenandoah Telephone Company (Telephone), 1 = Provides both regulated and unregulated telephone services and leases fiber optic facilities primarily throughout the Northern Shenandoah Valley.. Shenandoah Cable Television Company (CATV), 1 = Provides cable television service in Shenandoah County.. ShenTel Service Company (ShenTel), 1 = Provides Internet access to a multi-state region surrounding the Northern Shenandoah Valley, hosts Travel 511 for Virginia, and sells and services telecommunication equipment.. Shenandoah Valley Leasing Company (Leasing), 1 = Finances purchases of telecommunications. Shenandoah Mobile Company (Mobile), 1 = Provides tower rental space in the Company's PCS markets and paging services throughout the Northern Shenandoah Valley.. Shenandoah Long Distance Company (Long Distance), 1 = Provides long distance services.. Shenandoah Network Company (Network), 1 = Leases interstate fiber optic facilities.. ShenTel Communications Company (Shen Comm), 1 = Provides DSL services as a CLEC operation.. Shenandoah Personal Communications Company (PCS), 1 = As a PCS Affiliate of Sprint, provides digital wireless service to a portion of a four-state area covering the region from Harrisburg, York and Altoona, Pennsylvania, to Harrisonburg, Virginia.\nThe accounting policies of the segments are the same as those described in the summary of significant accounting policies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties.\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows:", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Significant Transactions\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the Virginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with Verizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated an analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, Rappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus the Company's 66% share of the partnership's working capital, which was approximately $1.7 million. The Company was required to do a working capital true up following the closing, from which the Company recorded a charge for $23 thousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to reflect the consolidated effective tax rate based on the final operating results for the year.\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the results of operations for the two months of 2003 that the operation remained a part of the Company.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n40\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nReflected in the 2003 results are several unusual items, which should be noted in understanding the financial results of the Company for 2003.", - "page_start": 41, - "page_end": 42, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 7. Significant Contractual Relationship\nIn 1999, the Company executed a Management Agreement (the Agreement) with Sprint whereby the Company committed to construct and operate a PCS network using CDMA air interface technology, replacing an earlier PCS network based on GSM technology. Under the Agreement, the Company is the exclusive PCS Affiliate of Sprint providing wireless mobility communications network products and services in its territory which extends from Altoona, York and Harrisburg, Pennsylvania, and south along the Interstate 81 corridor through Western Maryland, the panhandle of West Virginia, to Harrisonburg, Virginia. The Company is authorized to use the Sprint brand name in its territory, and operate its network under the Sprint radio spectrum license.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n28\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS", - "page_start": 29, - "page_end": 30, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Note 1. Summary of Significant Accounting Policies (Continued)\nBeginning in 2000, coinciding with the inception of activation fees in its PCS segment, nonrefundable PCS activation fees and the portion of the activation costs deemed to be direct costs of acquiring new customers (primarily activation costs and credit analysis costs) were deferred and recognized ratably over the estimated life of the customer relationship of 30 months in accordance with the Securities and Exchange Commission's Staff Accounting Bulletin\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n20\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS", - "page_start": 21, - "page_end": 22, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "LETTER TO THE SHAREHOLDERS\nVolunteerism is in Patty Pomeroy's blood. Her grandfather was a dispatcher for the rescue squad in Middletown, VA for 25 years and her grandmother was in the ladies auxiliary. Her father was a charter member of the Middletown Rescue Squad. In 1997, Patty, a customer service representative at Shentel for four years, continued the family tradition by earning her Emergency Medical Technician certification and going to 'work' for the Strasburg Rescue Squad. Patty is the administrator of membership recruitment and retention for the squad and is the liaison coordinator for junior squad members under 18. It is her job to make sure that new members are brought in to the squad and current members stay active.\n'There is a great satisfaction that comes from knowing that what you can do will help people.'\nJeff Beard has been an installer repairman with Shentel for almost five years. Two years ago, Jeff helped start Project Isaiah 58, a faith-based recovery ministry that reaches out to people who are struggling with addiction. Project Isaiah 58 has weekly group meetings in Winchester, Woodstock and Warrenton, VA. Jeff, who lives in Winchester, participates in the group meetings and also makes time to meet one-on-one with people who need personal attention.\n'I feel the need to reach out to people who are suffering.'\nJeff Beard\nJohn Gardner has been with Shentel for two years as a PCS technician in Central Pennsylvania, but for almost a year of that time he was on Naval Reserve duty in Sasebo, Japan. John joined the Reserves after serving 10 years of active duty. In October 2002, he was activated under Noble Eagle-Enduring Freedom as part of the increase in security at bases around the world. John worked on Motorola radios and repeater systems while stationed in Japan. It was tough for the serviceman to be away from his wife and children, but John believes very strongly in serving his country.\n'Being in the Reserves is a way for me to be a civilian and still serve my country.'\nJohn Gardner\nAt Shentel, George Brinkley, the store manager in Front Royal, VA, is known for being one of the biggest fund-raisers for the Shenandoah County American Cancer Society Relay for Life event. In his six years at the Company, George has raised nearly $20,000. In 2003, he raised $4,246 and was recognized as the top individual fund-raiser for the entire event.", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "DISCONTINUED OPERATIONS\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990's. The partnership's local customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December 31, 2002. The decline was the result of competition with digital technologies and increased competition from national carriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to transform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the partnership to one of the minority partners. The agreement was signed in November 2002, and closing was February 28, 2003. The Company's portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, $7.4 million and $6.7 million, respectively.", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "LETTER TO THE SHAREHOLDERS\nBrian Bosley, a Sprint PCS business-to-business sales representative with Shentel for the past three years, has always enjoyed sports. He takes his passion, knowledge and experience in sports, and volunteers his time with young people in his community. Brian has been active in the very successful Bridgewater, Virginia Community Little League program for the past four years. He currently serves as vice president of the Girls Minor League Softball. Brian also finds time to coach his daughters' T-ball and basketball teams.\n'I get a great sense of satisfaction from teaching kids and watching them grow and learn.'\nBrian Bosley\nCindy Rinker, corporate content editor at Shentel since October 2002, was recently named the 2004 chairman of the Woodstock, Virginia Downtown Enhancement Committee's Promotion Committee. The Downtown Enhancement group was established to find ways to revitalize downtown Woodstock. As a member for the past four years, Cindy has helped develop, plan and promote an impressive list of events from Light Up Woodstock at Christmastime to a street dance in spring, to Halloween on Court Square in October. The ultimate goal is to create a downtown area that is lively, attractive and reflective of Woodstock's important historical significance to the Shenandoah Valley and the Commonwealth of Virginia.\n'It is important to preserve the beauty and history of this area for the generations to come.'\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n4\nDavid Ferguson\nCindy Rinker\nRonnie Royster\nPEOPLE OF SHENTEL\nRonnie Royster and his wife Ellen, not only open their hearts to children in need, they open their home to children in need of a place to stay. Ronnie, a staff accountant with Shentel for five years, became a foster parent 10 years ago when he lived in Danville, VA. Currently, he and Ellen are members of the Warren County, VA Foster Parent organization. They have hosted two children since moving to Warren County. In the past, they hosted three international children; one from the Philippines and two from Brazil. Ronnie and Ellen have one birth child, but they have chosen to officially adopt six other children ranging in age from an infant to 8 years old.\n'The Lord blessed us, so when there are children out there who need help, we are able to offer it to them.'", - "page_start": 5, - "page_end": 6, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "FIVE-YEAR SUMMARY OF SELECTED FINANCIAL DATA\nA SIGNIFICANT MILESTONE FOR PCS\n2003 was the 10th anniversary of Shentel's decision to enter the PCS business and the 8th year operating as a Sprint PCS Affiliate. This year was a significant milestone for Shentel's PCS business, as we posted our first profitable quarter and recorded net income for the year of $0.3 million versus a net loss of $5.4 million in 2002.\nOur Sprint PCS wireless customer base continues to grow, with year-end customers at 85,139 spread from Harrisonburg, Virginia to Harrisburg, Pennsylvania. Our customers are averaging approximately 700 minutes of usage per month and we have one of the lowest customer churn rates in the industry. To keep up with this growth and improve our service, we continued investing in additional network facilities. We added capacity to 26 existing tower sites and installed 16 new tower locations bringing our total sites to 253. Our plan is to add capacity and build additional sites in 2004 in order to meet expected growth.\nWe added a new type of customer in 2003. Through Sprint's relationship with its wholesale cutomers, more than 11,000 pre-paid customers were added to our network. These pre-paid accounts, usually for customers with no established credit, are a low cost method to increase customers. They can purchase phones and some minutes at various convenience, electronic or department stores in addition to one of our company locations. When needed, they can easily purchase additional minutes.\nCamera phones and e-mailing pictures were hot in 2003. We now offer phones that can take and send a 15 second video. Late in the year, we launched Spirit PCS ReadyLink sm , the Sprint walkie-talkie style service. It is hoped that these new services will be major sales drivers in 2004.\nIn 2003, we focused on improving our distribution channels. We expanded and relocated our stores in Harrisonburg and Winchester, Virginia to handle our growing customer base. At our Edinburg, Virginia store, we expanded both our hours and office space. We continue to increase our direct sales force to expand our base of business customers. To make it convenient for our potential customers, we also grew the number of local third-party sales partners.", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "As a product manager, how can I reject an inventory in NAIIS ?", - "target_page": 38, - "target_passage": "Log in as PM. Click on “View Inventories Progress” under sub menu “Submission Management”. The “View Inventories Progress” screen appears. Select the appropriate inventory by clicking the Inventory name under column “Name” Press the “Reject” button ", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "NAIIS Web Application\n(Release version 1.1.3)", - "page_start": 0, - "page_end": 0, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Figure 55. Work on Inventories sub menu\n5. Click the appropriate Inventory year on 'Work on Inventories' under 'Submission' (figure 56, a).\n6. Press the 'Start Inventory' button to start the inventory (figure 56, b). Once pressed, the status changes to 'started' (figure 57).\n*** Once the 'Start Inventory' button has been pressed by the NFP or PM, a notification email will be sent to all SE's with the information that a new inventory was created. SE's and PM's can start entering their data into the NAIIS software. More details on how to do the data entry please see section 4.1 above.\nFigure 57. Work on Inventories screen - Status = Started\nNAIIS-User-Manual.Docx\nPage 36\n10/02/2013", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Figure 8: Start an Inventory screen\nOnce the 'Start Inventory' button is pressed, the status of the selected Inventory change to 'started'. (see Figure 9)\nNAIIS-User-Manual.Docx\nPage 9\n10/02/2013", - "page_start": 8, - "page_end": 8, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.5.2 Rejection of an inventory\n1. Log in as NFP.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 66).\n5. Press the 'Send for Rejection' button (figure 66, b).\nOnce the 'Send for Rejection' button was pressed, the status of the selected inventory changes to 'awaiting_rejection' (figure 67, a).\n*** Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM will be able to reject the submission. Proceed to section 10.4.2.\nFigure 66. Work on Inventories screen - Rejection of an inventory - Status = awaiting_approval\nFigure 67. Work on Inventories screen - Rejection of an inventory - Status = rejected_approval\nNAIIS-User-Manual.Docx\nPage 41\n10/02/2013", - "page_start": 40, - "page_end": 40, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.4.2 Rejection of an Inventory\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 62, a).\n5. Press the 'Reject' button (figure 62, b).\n*** Note: A notification email will be sent to the PM, once the 'Reject' button has been pressed. And the status changed to 'Awaiting_rejection_check' (figure 63).\nNAIIS-User-Manual.Docx\nPage 38\n10/02/2013\nFigure 62. Work on Inventories screen -Reject - Status = check\nNAIIS-User-Manual.Docx\nPage 39\n10/02/2013", - "page_start": 37, - "page_end": 38, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.2.2 Create, Start, Add new and View GHG inventory year\nThese functions allow the NFP and PM to create or edit a GHG inventory within the NAIIS software.", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.2 Start of inventory/submission (NFP or PM)\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year identified will be made available in the new inventory/submission.\nThese are the steps to start a new inventory:\n1. Click on 'View Inventories Progress' under sub menu 'Submission Management' (figure 53).\nFigure 53. View Inventories Progress sub menu\n2. The 'View Inventories Progress' screen appears (figure 54).\n3. Select the appropriate inventory by clicking the box under column 'Working Inventory' (figure 54, a).\n*** Note: The selected appropriate inventory should be in status 'created' (figure 54, b)\nNAIIS-User-Manual.Docx\nPage 35\n10/02/2013", - "page_start": 34, - "page_end": 34, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.1 Workflow\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting submission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating to the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG inventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web application (figure 52).\nFigure 52: Non-Annex I Inventory Software workflow", - "page_start": 34, - "page_end": 34, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.5.1 Approval of an inventory\n1. Log in as NFP.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 64).\n5. Press the 'Approve' button (figure 64, b).\nOnce the 'Approve' button was pressed, the status of the selected inventory changes to 'approved' (figure 65, b).\n*** Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM may proceed to selecting the tables for preparing the official submission (See section 10.6).\nFigure 64. Work on Inventories screen - Approve an inventory - Status = awaiting_approval\nFigure 65. Work on Inventories screen - Approve an inventory - Status = approved\nNAIIS-User-Manual.Docx\nPage 40\n10/02/2013", - "page_start": 39, - "page_end": 39, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Figure 5. Create new GHG inventory screen\nFigure 6. New GHG inventory created screen\nNAIIS-User-Manual.Docx\nPage 8\n10/02/2013", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "What is the global warming potential of Perfluorohexane ?", - "target_page": 48, - "target_passage": "7,400", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Annex 3: Global Warming Potentials (GWPs)\nformula = C2F6. Perfluroethane, 1995 IPCC GWP = 9,200. Perfluoropropape, Chemical formula = C3F8. Perfluoropropape, 1995 IPCC GWP = 7,000. Perfluorobutane, Chemical formula = C2F10. Perfluorobutane, 1995 IPCC GWP = 7,000. Perfluorocyclobutane, Chemical formula = c-c4F8. Perfluorocyclobutane, 1995 IPCC GWP = 8,700. Perfluoropentane, Chemical formula = C5F12. Perfluoropentane, 1995 IPCC GWP = 7,500. Perfluorohexane, Chemical formula = C6F14. Perfluorohexane, 1995 IPCC GWP = 7,400. Sulphur hexafluoride, Chemical formula = SF6. Sulphur hexafluoride, 1995 IPCC GWP = 23,900\nSource: Climate Change 1995, The Science of Climate Change: Summary for Policymakers and Technical Summary of the Working Group I Report, page 22.\nNAIIS-User-Manual.Docx\nPage 48\n07/08/2013", - "page_start": 47, - "page_end": 47, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "1. Introduction\nThe public's distinct understanding of the cause and e GLYPH<11> ect of the global climate issue is an obstacle to joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], previous studies noticed that the public had even failed to reach an agreement on whether 'climate change' or 'global warming' is the most appropriate definition of the global climate concern [3-5]. According to the definition provided by [6], global warming describes global climate issues as a continuous increase in the average temperature of Earth's surface due to anthropogenic emissions of greenhouse gases, whereas climate change includes not only temperature rise but also a range of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062; doi:10.3390 / ijerph17031062\nwww.mdpi.com / journal / ijerph\n/gid00001\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n2 of 22\ncomplex changes in the state of the climate [7], which may be caused by natural process, external forces, or human interventions [8]. By randomly assigning respondents to climate change or global warming questionnaires, scholars confirmed that the di GLYPH<11> erent connotations contained in the two definitions are likely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which may inhibit collaboration and joint e GLYPH<11> orts to mitigate the global challenge.\nPublic preference between climate change and global warming is even more apparent when considering the ideology spectrum [10]. Some scholars concluded that conservatives, who are less concerned with environmental issues, tended to use global warming as a narrative strategy because global warming has a more direct connection with temperature rise, making it easier to find contradictory cues such as freezing weather or heavy snowstorms to deny global climate change facts [11]. The associations between global warming and human activities may contribute to more controversies as well [12], connecting global warming more with the 'hoax' frame [5] and evoking greater negative sentiment [13].", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nClimate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting different aspects of Climate change and global warming have long been two competing frameworks shaping the public's perceptions, memory, and interpretations of climate issue by highlighting di GLYPH<11> erent aspects of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n13 of 22\nissues and re-constructing them di GLYPH<11> erently. By comparing the persistent words used related to the two discourses in the 10-year period in Table 2, we think that global warming showed a relative preference toward general descriptions or slogans, such as 'earth' and 'pollution', whereas 'climate change' was more associated to specific issues like 'solar', 'coal', 'china', and 'food'.\nStudies have suggested that the public shows a preference for scientific publications with general keywords compared with those with complicated scientific jargon [47], lacking a deep understanding of the complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions seem to suit global warming more than climate change according to the current study, which is probably because climate change receives more publicity and recognition than global warming in the scientific community. In the association network shown in Figure 2, global warming was found to be more connected with temperature abnormalities. This finding is in accordance with studies reporting that short-term temperature anomalies [87] can increase the public's belief about global warming by increasing the understanding of this abstract issue [88], although scientists mostly make judgments based on long-term weather statistics [89]. However, none of the four words, 'snow', 'summer', 'winter', or 'heatwave' in the temperature theme of global warming were ranked in the top 50 nodes list of the climate change network.", - "page_start": 11, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "Results\n/T_here are apparent trends of humidi/fication in most regions under global warming by 1.5 °C and 2.0 °C; but the drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is 73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; the area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the area is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere and the middle regions of Northern Hemisphere. /T_he distribution of precipitation under global warming by 2.0 °C is similar with the situation under global warming by 1.5 °C. /T_he drought-threatened area would increase by 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; the area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the extreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than those under global warming by 1.5 °C, which is what we should be pay more attention to.\nYield change of maize under global warming by ͷ.ͻ °C and ͸.Ͷ °C. Maize production is a/ffected by climate change apparently. According to the simulation results of CERES-maize, the yield of maize would decrease in the worldwide relative to 1986-2005 under global warming by 2.0 °C; it would increase little under global warming by 1.5 °C. /T_he distributions of maize yield loss under the two scenarios are similar to each other, mostly located in the middle and low latitude, which are the main regions for maize planting in the world. /T_he loss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of 1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize planting area in the world, in which the climate situation would become more proper for maize under global\nͻ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed9.pdf" - }, - { - "text": "2.1. Climate Change, Global Warming, and Frames\nExisting studies have noted that the subtle di GLYPH<11> erence between climate change and global warming evokes di GLYPH<11> erent public cognitive responses, where global warming'indicates heat-related impacts, human causes, increased UV light penetration, ozone depletion, and the greenhouse e GLYPH<11> ect, whereas climate change is more associated with a wide range of influences on climate, including drought and agriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with ice, snow, and sea, whereas climate change was always connected with scientific investigations, such as\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n3 of 22\nreports, the environment, and science [13]. Some respondents even hold the belief that global warming results in climate change [9].\nThe two distinct climate discourses being produced based on the same reality can be explained by the framing theory in communication study. Framing refers to the phenomenon where the reality is always partially selected or highlighted when described by the public or media [19]. By distinctly defining problems, suggesting solutions, and indicating casual interpretations [20], di GLYPH<11> erent frames tell the audience di GLYPH<11> erent stories and influence how they observe facts [21,22]. Two types of frames, equivalency frames and emphasis frames, are commonly studied by scholars to examine how framing e GLYPH<11> ects influence individuals' attitudes and beliefs [23]. Equivalency frames describe the same fact or logic with di GLYPH<11> erent words and may suggest that the audience perceives facts in psychologicallydi GLYPH<11> erent ways [24]. For example, a cup can be described as 'half full' and 'half empty', where the former is a positive frame indicating a reference point lower than current status, and the latter is negative, meaning that the reference point is above the current situation [25]. Emphasis frames employ words selectively associated with parts of reality to shift the audience's attention to particular attributes [26]. Climate change and global warming have been noted to highlight di GLYPH<11> erent aspects of an issue by activating distinct cognitive accessibility patterns [27].", - "page_start": 1, - "page_end": 2, - "source_file": "pubmed10.pdf" - }, - { - "text": "2.1. Climate Change, Global Warming, and Frames\nDi GLYPH<11> erent frames concerning the global climate concern are popular among the public, politicians, environmentalists, and the media [1,28,29]. Big data analyses have indicated that when interpreting climate events, individuals' preference for frameworks was influenced by demographics [5] and social-political background [2]. Di GLYPH<11> erent choices of frameworks can evoke di GLYPH<11> erent psychological processes [30], promote or inhibit engagement intentions [31], or gain approval on various levels [32].\nStudies have noted that the frameworks of climate change and global warming may result from di GLYPH<11> erent political indications. The American Republican-leaning states show more preference for global warming than climate change compared with Democratic-leaning states, and global warming is more connected with 'hoax' in questioning the reality of the global climate issue [5]. Conservatives are more likely to link heat-related phenomena to global warming, whereas liberals associate these facts equally with both frames [27]. An earlier survey conducted by [4] argued that wording choice might not influence the whole population similarly. For the whole sample and politically independent individuals, the two terminologies were equally serious, but climate change seemed more serious compared with global warming among the Republicans, and the Democrats held the opposite opinion.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" - }, - { - "text": "Discussion and conclusion\nDiscussion. Our analysis highlights the e/ffects of climate change on global- and regional-speci/fic maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We /find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warming by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. /T_he limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\nͷͶ\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/\nFigure 7. Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C.\nFigure 8. Changes in Self-su/fficiency ratio of maize in main countries under global warming by 1.5 °C and 2.0 °C.\nmeantime, the huge di/fferences in yield changes in di/fferent regions provide a small chance for the world, especially under global warming by 1.5 °C. In the near future, if the global temperature can be e/ffectively controlled under 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. All regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the potentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the yield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 10, - "source_file": "pubmed9.pdf" - }, - { - "text": "Materials and methods\nFirstly, the period of 1986-2005 is de/fined as the baseline, of which the simulated average value is recognized as 0.61 °C above pre-industrial (the period of 1850-1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between di/fferent periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986-2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. /T_hirdly, the climate data of global warming by 1.5 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 1.5-2.0 °C above pre-industrial levels at the end of the twenty-/first century; the climate data of global warming by 2.0 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 2.0-2.5 °C above pre-industrial levels at the end of the twenty-/first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately con/firmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020-2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041-2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060-2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065-2084.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nKuo Li ͷ * , Jie Pan ͷ , Wei Xiong ͸ , Wei Xie ͹ & Tariq Ali ͹\nClimate change is becoming more and more remarkable which has an obvious impact on crop yields all over the world. Future climate scenario data was simulated by ͻ climate models recommended by ISI-MIP under ͺ RCP scenarios, in which the approximate scenarios with global warming by ͷ.ͻ °C and ͸ °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the world under global warming by ͷ.ͻ °C and ͸.Ͷ °C were analyzed and the market prices of maize at national and global levels were simulated. The results showed that, the risk of maize yield reduction under ͸.Ͷ °C scenario was much more serious than ͷ.ͻ °C scenario; the ratios of yield changes were separately Ͷ.ͷ;% and - ͷͶ.;% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. The reduction trend of total maize production is obvious in the top five countries and the main producing regions of the world, especially under the ͸.Ͷ °C scenario. The market price of maize would increase by around Ͷ.ͽ% and ͹.ͺ% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. With the quickly increasing population in the world, it is urgent for all countries to pay enough attention to the risk of maize yield and take actions of mitigation and adaptation to climate change.\nIn the past hundred years, the global climate has experienced great changes 1-4 . According to the sixth assessment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and almost all regions in the world experienced surface warming 5 . Due to global warming, the extreme climate events become more and more frequent, and the ecological environment problems caused by climate change are more and more serious, which restrict the sustainable development of human society and health 6-10 . Global warming has gradually changed from a scienti/fic issue to a major social issue of common concern to governments and people of all countries 11-13 . In 2016, nearly 200 parties of the United Nations Framework Convention on climate change reached the Paris Agreement at the climate change conference in Paris 14 . Paris Agreement has indicated and pursue e/fforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - }, - { - "text": "References\n7. Caitlyn Kennedy, R.L. What's the Di GLYPH<11> erence between Global Warming and Climate Change? 2015. Available online: https: // www.climate.gov / news-features / climate-qa / whats-di GLYPH<11> erence-between-global-warming-andclimate-change (accessed on 10 October 2019).\n8. Pachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.; Dasgupta, P.; et al. Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change ; IPCC: Geneva, Switzerland, 2014.\n9. Whitmarsh, L. What's in a name? Commonalities and di GLYPH<11> erences in public understanding of 'climate change' and 'global warming'. Public Underst. Sci. 2009 , 18 , 401-420. [CrossRef]\n10. Shehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global warming. Journal. Stud. 2012 , 13 , 175-192. [CrossRef]\n11. Schuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues a GLYPH<11> ect belief in 'global warming' versus 'climate change'. Soc. Cogn. 2014 , 32 , 217-238. [CrossRef]\n12. McCright,A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative movement's counter-claims. Soc. Probl. 2000 , 47 , 499-522. [CrossRef]\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. PLoS ONE 2015 , 10 , e0138996. [CrossRef]\n14. Anderson, J.R. The Architecture of Cognition ; Psychology Press: London, UK, 2013.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "How can I request access to NAIIS ?", - "target_page": 5, - "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "NAIIS Web Application\n(Release version 1.1.3)", - "page_start": 0, - "page_end": 0, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.2.1 How to access the NAIIS application\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on the browser's address bar. (figure 1 and figure 2)\nFigure 1. Using Internet Explorer browser\nFigure 2. Using Firefox browser\nNAIIS-User-Manual.Docx\nPage 6\n10/02/2013\nPress the 'Enter key' and the non-Annex I Greenhouse Gas Inventories web page appears.\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure 3, number 1) and the log-in page will be displayed. (figure 4)", - "page_start": 5, - "page_end": 6, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "2.3 Contact\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int .\nNAIIS-User-Manual.Docx\nPage 5\n10/02/2013", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "NAIIS-User-Manual.Docx\nPage 1\n10/02/2013", - "page_start": 0, - "page_end": 0, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Contents\nNAIIS-User-Manual.Docx\nPage 3\n10/02/2013", - "page_start": 2, - "page_end": 2, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Figure 3. UNFCCC non-Annex I Greenhouse Gas Inventories web page\nFigure 4. Log-in page of the NAIIS Web Application\nTo log-in , enter the username and password and click on the 'Sign in' button.\nNAIIS-User-Manual.Docx\nPage 7\n10/02/2013", - "page_start": 6, - "page_end": 6, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.1 User Access, Roles and Privileges\nThe users of the application are the members of the national team(s) of non-Annex I Parties involved in the preparation of their national GHG inventories, and each user is assigned a role.\nThe table below explains the different levels of the access rights and corresponding explanation for each role. It is important to note that the roles are not necessarily identical to a person's title (e.g. National Focal Point) and that a person can take on several roles (which may be necessary for some countries).\nThere are three types of access rights (roles) to the NAIIS application:\nNational Focal Point (NFP): Will be responsible for identifying the members of the team and is the only one who has the right to approve the submission of any GHG inventory., Process to gain access rights = Parties that have not already requested and received access rights can obtain them by having their National Focal Point contact: naiisapp@unfccc.int. NFPs will have the option to create, edit, update or delete all of their country's GHG data entries, and grant access rights to the 'Project Manager' and 'Sectoral Experts' for their country if they choose., Process to gain access rights = (Note: Some Parties may have more than one individual acting as the NFP; however the system can accommodate only one account per Party).. Project Manager (PM) : Will have the right to enter/edit data in all sectors, as well as to generate an official submission to the UNFCCC, and grant access rights to the 'Sectoral Experts' for their country., Process to gain access rights = Entities will be provided these rights by their NFP. If a Party decides to grant access to a PM, their NFP will be able to create such user account on the NAIIS application.. Sectoral Experts (SE) : Will have the right to enter/edit data in respective sector(s)., Process to gain access rights = Experts will be provided these rights by their NFP and PM. If a Party decides to grant access to Sectoral Experts, the NFP will be able to create such user accounts and assign them in respective sector(s).\nAccess for the NFP will be provided by the secretariat, upon request; however, the accounts of the other users within the country shall only be created by the NFP.", - "page_start": 5, - "page_end": 5, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Figure 50. Consistency screen - message 'No data found'\nNAIIS-User-Manual.Docx\nPage 34\n10/02/2013", - "page_start": 33, - "page_end": 33, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "2 General information\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG inventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their national communications and biennial update reports.", - "page_start": 3, - "page_end": 3, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.3.2.2 Disable User\nOn the Disable/Enable screen, search for the user whose account should be de-activated and tick the 'Disabled' box (figure 22a).\nNAIIS-User-Manual.Docx\nPage 15\n10/02/2013", - "page_start": 14, - "page_end": 14, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "What is the problem regarding the use of the Book3 dataset ?", - "target_page": 2, - "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "3.4.1 How to visualize graphical data from a dataset resource\nAs a result of a dataset search, the system displays on th e 'Dataset' tab all distributions (resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset can be further explored by clicking on ' Open Visualization ' under the ' Options ' button -if available.\nEuropean Data Portal Version 4.3 -User Manual\nPage 43 of 57\nAfter clicking on the ' Open Visualization ' button, the user should execute the following steps:", - "page_start": 42, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "A.1 All datasets\nTable 3 displays the size of each dataset along with the average number of tokens per sample and their references. The dataset's content was tokenized using cl100k_base encoding. For Retrieval, the two numbers refer to the queries and the documents. For Reranking, the three numbers refer to the queries, the pairs of queries with relevant documents and the pairs of queries with irrelevant ones, respectively. The pairs of queries and documents are obtained from the 90 documents extracted. For SummEvalFr , the three numbers refer to the texts, human and machine summaries, respectively.\nFigure 3 represents the semantic similarity between each dataset. The methodology was as follows: 90 random samples per dataset are embedded using the multilingual-e5-large model. The embeddings of each dataset's samples are averaged. The similarity between each dataset is then calculated using cosine similarity as in (Muennighoff et al., 2022).\nWe complement this analysis by observing the dataset's clouds of embedding in a 2D plane using PCA in Figure 4.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.1.5 Similarity analysis\nWe investigate the proximity between the datasets' topics to give insights about the benchmark contents. The methodology introduced by Muennighoff et al. (2022), i.e. computing an average embedding of samples from each dataset, is used to build a dataset-similarity matrix (displayed in appendix Figure 3). The distances between averaged embedding vectors of each dataset (which range from 0 . 89 to 1 in Figure 3) remain hard to interpret into a dataset semantic proximity. Thus, we complement this by observing the dataset's clouds of embedding in a 2D plane using PCA in Figure 4.\nFigures 4 and 3 seem to correlate, showing high similarity between two datasets when the same underlying data is used in different tasks. Dataset topics are pretty close, with some exceptions, such as the Syntec dataset. As more datasets are added to the benchmark, this analysis will help select new data that do not produce redundant results. It may also help to understand the link between the results and the datasets' topics.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "What dataset management practices are necessary?\nNo matter how a books data commons gets built, it will be important to consider broader aspects of data governance. For example:\n· Dataset documentation and transparency: Transparent documentation is important for any dataset used for AI training. A datasheet is a standardized form of documentation that includes information about provenance and composition of data, and includes information on management practices, recommended uses or collection process.\n· Quality assurance: Above, we note the many features that make books useful for AI training, as compared with web data, for example. That said, the institution managing a books commons dataset may still want to collect and curate the collection to meet the particular purposes of its users. For instance, it may want to take steps to mitigate biases inherent in the dataset, by ensuring books are representative of a variety of languages and geographies.\n· Understanding uses: The institution managing a books commons dataset could measure and study how the dataset is used, to inform future improvements. Such monitoring may also enable accountability measures with respect to uses of the dataset. Introducing community norms for disclosing datasets used in AI training and other forms of AI research would facilitate such monitoring.\n· Governance mechanisms: In determining matters like acceptable and ethical use, the fundamental question is 'who decides.' While this might be settled simply by whoever sets up and operates the dataset and related infrastructure, participatory mechanisms - such as advisory bodies bringing together a broad range of users and stakeholders of a collection - could also be incorporated.\nTowards a Books Data Commons for AI Training\n19", - "page_start": 19, - "page_end": 19, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "A.2 Created datasets\nSyntec Figure 5 shows an extract from the Syntec dataset with a document and a query relative to this document.\nHAL Figure 6 is an extract from the HAL dataset. Table 4 lists the distribution of classes ( domain field) for the HAL dataset on raw subset and mteb_eval subset, which is used for MTEB evaluation. Labels descriptions can be found at this URL: https://api.archivesouvertes.fr/ref/domain/?q=*:*&rows=393 or in Table 4. After pre-processing, mteb_eval covers titles from 10 domains as classes with less than 500 samples were removed. In the MTEB evaluation subset of the dataset, titles composed of 2 words or less have been removed (371 samples), resulting in an average word count of 13 . 4 . Figure 7 shows the word count distribution per title. Furthermore, the dataset has been cleaned up by manually removing all non-French titles. Additionally, it can be observed in Table 4 that in the original raw dataset, the shs and sdv classes represent by far the majority of the dataset samples with respectively 58706 samples (73%) and 11049 samples (13%). In order to\n12\nmitigate the class imbalance while preserving the majority of those classes, they have been randomly subsampled to 6701 and 4803 samples. Furthermore, baseline models have been trained and tested to assess the usability of this dataset in other tasks, such as classification and topic modeling. Table 5 shows the results obtained.\nSummEvalFr Extracts of humans and machine summaries translated in French from SummEvalFr and the original ones in English from SummEval (Fabbri et al., 2021) are shown in Figure 9. As explained in section 3.1.3, we use a LLM to evaluate the quality of translations for human summaries, we provide the prompt used with GPT-4 for this evaluation in Figure 8.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.2.2 How to filter datasets by using 'Faceted Search'\nThe user can find suitable datasets by perfo rming a 'Faceted Search' . This means the user systematically adds properties, which the desired dataset should fulfill, e.g. a dataset should be part of a specific catalogue or category. The following properties are available:\n· Countries,\n· Catalogues,\n· Categories,\n· Tags,\n· Formats,\n· Licences.\nThose facets are presented on the left side of the main dataset page. The available options for each facet always reflect the availability of it in the current set of results. The numbers in brackets indicate how many datasets in total have that property e.g. there are 117,610 datasets with a distribution in CSV format.\nEuropean Data Portal Version 4.3 -User Manual\nPage 27 of 57\nBy clicking on a facet the result set is filtered by the selected property. Multiple selections are linked together by a logical ' AND or ' OR ' .\nThe following example will find datasets which are from catalogue 'data.gov.uk' AND are in the categories ' Environment ' AND have a distribution in the formats ( 'CSV' or JSON ' ).\nFacets can be selected and deselected. In addition a key word can be entered to filter the results even more.\nEuropean Data Portal Version 4.3 -User Manual\nPage 28 of 57", - "page_start": 26, - "page_end": 27, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\n· Samples belonging to domain classes with less than 500 samples were removed, which leads us to keep only 10 classes.\n· Subsampling was performed on 2 classes containing more than 10k samples each to lower the number of samples and mitigate the unbalance of the dataset.\nMore details about this process are provided in the appendix A.2 along with some extracts in Figure 6. We make the dataset publicly available in both their raw and clean versions. We use this dataset in a clustering setup to cluster publications by their title and use the domain as ground truth. To ensure the quality of this dataset, we run 3 baseline models for classification: TF-IDF + SVM , a fine-tuned Camembert (Martin et al., 2019) and GPT-4 leveraging In-Context Learning (ICL). Furthermore, we run one baseline model for topic modeling: Latent Dirichlet Allocation (LDA) (Blei et al., 2003) and report scores in the appendix A.2.", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.2 Datasets (Data Platform)\nThe datasets section is the main access point for browsing, filtering and searching the datasets . It offers a faceted search, a full text search and a geographical search. The dataset view provides access and information to the distributions of the dataset.\nThe home page of this section appears like this:\nEuropean Data Portal Version 4.3 -User Manual\nPage 26 of 57", - "page_start": 25, - "page_end": 25, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "1. Introduction 1\nWhile the field of artificial intelligence research and technology has a long history, broad public attention grew over the last year in light of the wide availability of new generative AI systems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These tools are developed using machine learning and other techniques that analyze large datasets of written text, and they are capable of generating text in response to a user's prompts.\nWhile many large language models rely on website text for training, books have also played an important role in developing and improving AI systems. Despite the widespread use of ebooks and growth of sales in that market, books remain difficult for researchers and entrepreneurs to access at scale in digital form for the purposes of training AI.\nIn 2023, multiple news publications reported on the availability and use of a dataset of books called 'Books3' to train LLMs. The Books3 dataset contains text from over 170,000 books, 2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works contained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and Bloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role do books play in training AI models, and how might digitized books be made widely accessible for the purposes of training AI? What dataset of books could be constructed and under what circumstances?\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series of workshops to investigate the concept of a responsibly designed, broadly accessible dataset of digitized books to be used in training AI models. Conducted under the Chatham House Rule, we set out to ask if there is a possible future in which a 'books data commons for AI training' might exist, and what such a commons might look like. The workshops brought together practitioners on the front lines of building next-generation AI models, as well as legal and policy scholars with expertise in the copyright and licensing challenges surrounding digitized books. Our goal was also to bridge the perspective of stewards of", - "page_start": 1, - "page_end": 1, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Implications of Overall Approach\nBy relying on existing limitations and exceptions in copyright law, the number of books one could include in the corpus of a books data commons is far greater and more diverse. Of course, a bigger dataset doesn't necessarily mean a higher quality dataset for all uses of AI models; as HathiTrust shows, even a multimillion book corpus can skew in various directions. Still, dataset size generally remains significant to an LLM's performance - the more text one can train on, or rather the more tokens for training the model, the better, at least along a number of performance metrics. 37\nWhile holding the potential for a broader and more diverse dataset, a key limitation in pursuing this approach is that it is only feasible where relevant copyright limitations and exceptions exist. Even then, legal uncertainty means that going down this path is likely to generate, at a minimum, expensive and time-consuming litigation and regulatory\nThis is explained explicitly in the appeals court's decision: Authors Guild v. HathiTrust, 755 F.3d 87 (2d 35 Cir. 2014).\nHathiTrust has also made available some data derived from books, such as the Extracted Features 36 set: 'HTRC releases research datasets to facilitate text analysis using the HathiTrust Digital Library. While copyright-protected texts are not available for download from HathiTrust, fruitful research can still be performed on the basis of non-consumptive analysis of transformative datasets, such as in HTRC's flagship Extracted Features Dataset, which includes features extracted from full-text volumes. These features include volume-level metadata, page-level metadata, part-of-speech-tagged tokens, and token counts:' https://analytics.hathitrust.org/datasets#top.", - "page_start": 15, - "page_end": 15, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "In the United States, before which date is book out of copyright for sure ?", - "target_page": 9, - "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "4. Copyright, Licensing, & Access to Books for Training\nEven if books can be acquired, digitized, and made technically useful for AI training, the development of a books data commons would necessarily need to navigate and comply with copyright law.\nOut-of-Copyright Books: A minority of books are old enough to be in the public domain and out of copyright, and an AI developer could use them in training without securing any copyright permission. In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on, it is worth noting that the status of whether a book is in the public domain can be difficult to determine. For instance, books released between 1929 and 1963 in the U.S. are 14 out of copyright if they were not subject to a copyright renewal; however, data on copyright renewals is not easily accessible.\nWhat's more, copyright definitions and term lengths vary among countries. Even if a work is in the public domain in the US, it may not be in other countries. Countries generally use the 15 life of the last living author + 'x' years to determine the term of copyright protection. For most countries, 'x' is either 50 years (the minimum required by the Berne Convention) or 70 years (this is the case for all member states of the European Union and for all works published in the U.S. after 1978). This approach makes it difficult to determine copyright terms with certainty because it requires information about the date of death of each author, which is often not readily available.\nIn-Copyright Books: The vast majority of books are in copyright, and, insofar as the training process requires making a copy of the book, the use in AI training may implicate copyright law. Our workshop covered three possible paths for incorporating such works.", - "page_start": 8, - "page_end": 8, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Direct licensing\nOne could directly license books from rightsholders. There may be some publishers who are willing to license their works for this purpose, but it is hard to determine the scale of such access, and, in any event, there are significant limits on this approach. Along with the challenge (and expense) of reaching agreements with relevant rightsholders, there is also the practical difficulty of simply identifying and finding the rightsholder that one must negotiate\nFor a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler. Finding the Public Domain: 14 Copyright Review Management System Toolkit . 2016, quod.lib.umich.edu/c/crmstoolkit/ 14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. 'LibGuides: Copyright at Cornell Libraries: Copyright Term and the Public Domain.' guides.library.cornell.edu/copyright/publicdomain; Mannapperuma, Menesha, et al. Is It in the Public Domain? A HANDBOOK for EVALUATING the COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES . 1923.\nSee e.g. Moody, Glyn. 'Project Gutenberg Blocks Access in Germany to All Its Public Domain Books 15 because of Local Copyright Claim on 18 of Them.' Techdirt , 7 Mar. 2018, www.techdirt.com/ 2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-localcopyright-claim-18-them/. Accessed 20 Mar. 2024.\nTowards a Books Data Commons for AI Training\n8\nwith. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most are not actively managed by their rightsholders. There is no official registry of copyrighted works and their owners, and existing datasets can be incomplete or erroneous. 16\nAs a result, there may be no way to license the vast majority of in-copyright books, especially those that have or have had limited commercial value. Put differently, the barrier to using 17 most books is not simply to pay publishers; even if one had significant financial resources, licensing would not enable access to most works.", - "page_start": 8, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Reliance on Copyright Limitations and Exceptions\nThe first important limitation is that almost every digital book published today comes with a set of contractual terms that restrict what users can do with it. In many cases, those terms will explicitly restrict text data mining or AI uses of the content, meaning that even where copyright law allows for reuse (for example, under fair use), publishers by contract can impose restrictions anyway. In the United States, those contract terms are generally thought to override the applicability of fair use or other limitations and exceptions. Other 23 jurisdictions, such as those in the EU, provide that certain limitations and exceptions cannot be contractually overridden, though experience to date varies with how those anti-contractual override protections work in practice. 24\nThe second limitation is the widespread adoption of 'anti-circumvention' rules in copyright laws and the interplay of these with a choice to rely on copyright limitations and exceptions. Digital books sold by major publishers are generally encumbered with 'digital rights management' (DRM) that limits how someone can use the digital file. For instance, DRM can limit the ability to make a copy of the book, or even screenshot or excerpt from it, among other things. Anti-circumvention laws restrict someone's ability to evade these technical restrictions, even if it is for an ultimately lawful use.\nWhat this means for our purposes is that even if one acquires a digital book from, for example, Amazon, and it is lawful under copyright law to use that book in AI training, it can still generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. 25 Thus, the ability to use in-copyright books encumbered by DRM - that is, most all books sold by major publishers - is generally limited. 26\nPractically, using in-copyright books to build a books commons for AI training - while relying on copyright's limitations and exceptions - requires turning a physical book into digital form, or otherwise engaging in the laborious process of manually re-creating a book's text (i.e., retyping the full text of the book) without circumventing the technical restrictions themselves.", - "page_start": 11, - "page_end": 11, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Reliance on Copyright Limitations and Exceptions\nEven if a book is in copyright, it's possible that copying books for AI training may be covered by existing limitations and exceptions to copyright law in particular jurisdictions. For example:\n· In the United States, many argue using existing works to train generative AI is 'fair use,' consistent with existing law and legal precedents. This is the subject of a 19 number of currently active court cases, and different actors and tools may yield different results, as fair use is applied case-by-case using a flexible balancing test.\n· In the European Union, there are explicit exceptions in the law for 'text and data mining' uses of in-copyright works, both for non-commercial research and for commercial purposes. However, for commercial uses and for users outside of research and heritage institutions, they must respect the rights of rightsholders who choose to 'reserve their rights' (i.e., opt-out of allowing text and data mining) via machine readable mechanisms. The exception also requires that users have 'lawful 20 access' to the works.\n· Finally, Japan provides a specific text and data mining exception, without any comparable opt-out requirement for commercial uses as is embedded in EU law. 21\nWhile exceptions that allow AI training exist in several other countries, such as Singapore and Israel, most countries do not provide exceptions that appear to permit AI training. Even where potentially available, as in the United States, legal uncertainty and risk create a hurdle for anyone building a books commons. 22\nSee e.g. Comments from Sprigman, Samuelson, Sag to Copyright Office, October 2023, at https:// 19 www.regulations.gov/comment/COLC-2023-0006-10299 as well as many other submissions to the US copyright office; see also Advocacy, Katherine Klosek, Director of Information Policy and Federal Relations, Association of Research Libraries (ARL), and Marjory S. Blumenthal, Senior Policy Fellow, American Library Association (ALA) Office of Public Policy and. 'Training Generative AI Models on Copyrighted Works Is Fair Use.' Association of Research Libraries , 23 Jan. 2024, www.arl.org/blog/ training-generative-ai-models-on-copyrighted-works-is-fair-use/.", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Permissively licensed works\nSee e.g. Heald, Paul J. 'How Copyright Makes Books and Music Disappear (and How Secondary 16 Liability Rules Help Resurrect Old Songs).' Illinois Program in Law, Behavior and Social Science Paper No. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. Accessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, Rebecca J. 'Why Are so Few Books from the 20th Century Available as Ebooks?' The Atlantic , 18 Mar. 2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-centuryavailable-as-ebooks/284486/. See also 'Google Book Search Settlement and Access to Out of Print Books.' Google Public Policy Blog , publicpolicy.googleblog.com/2009/06/google-book-searchsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed classaction settlement between Google, the Authors Guild, and the Association of American Publishers). Google's final brief in the settlement proceedings notes the 'prohibitive transaction costs of identifying and locating individual Rightsholders of these largely older, out-of-print books' - see this brief at https:// web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ google_final_approval_support.pdf. The Authors Guild and Association of American Publishers also justified the settlement's terms in light of the fact that 'the transaction costs involved in finding copyright owners and clearing the rights are too high'; while they argued that most works are not truly 'orphans,' they note that total transaction costs as a whole (including, for example, determining whether the author or publisher holds the rights and then negotiating rates) are so high as to block uses of outof-print works anyway - see this brief at https://web.archive.org/web/20130112060213/http://", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Royalties\nThe Copyright Board of Canada (Copyright Board) oversees the administration of copyright royalties in Canada and establishes the royalties to be paid for the use of certain copyrighted works. It sets the copyright tariff royalties that Canadian broadcasting undertakings, including cable, radio, television and specialty services, pay to copyright collectives.", - "page_start": 70, - "page_end": 70, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Reliance on Copyright Limitations and Exceptions\nSee Hansen, Dave. 'Fair Use Week 2023: How to Evade Fair Use in Two Easy Steps.' Authors Alliance , 23 23 Feb. 2023, www.authorsalliance.org/2023/02/23/fair-use-week-2023-how-to-evade-fair-use-in-twoeasy-steps/. Accessed 20 Mar. 2024.\nSee Band, Jonathan. 'Protecting User Rights against Contract Override.' Joint PIJIP/TLS Research 24 Paper Series , 1 May 2023, digitalcommons.wcl.american.edu/research/97/. Accessed 20 Mar. 2024.\nIn the U.S. the Copyright Office has recognized the importance of allowing particular exceptions for 25 researchers engaged in text and data mining. See their rulemaking in 2021 https:// www.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-oncircumvention-of-copyright-protection-systems-for-access-control. These rules are reviewed triennially and are currently under review, with submissions suggesting both contraction and expansion; see the Authors' Alliance comments in January 2024 https://www.authorsalliance.org/2024/01/29/authorsalliance-submits-long-form-comment-to-copyright-office-in-support-of-petition-to-expand-existing-textand-data-mining-exemption/. It is possible that one could argue for these exceptions to be expanded, and then work to renew that exception every three years. The EU's text and data mining exception may also limit use of DRM to impede data mining, but only for particular covered research and heritage institutions; commercial and other users are not covered, however.\nNote that CC licenses forbid use of DRM - but that doesn't address most all books sold by publishers. 26\nTowards a Books Data Commons for AI Training\n11", - "page_start": 11, - "page_end": 11, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Implications of the The Overall Approach\nStepping back from The Pile v2 specifically, or any particular existing collection of books or dataset built on their basis, we want to understand the implications of relying on public domain works and expressly licensed works in building a books commons.\nThe benefits are relatively straightforward. Both categories, by definition come with express permission to use the books in AI training. The cost of acquiring the books for this use may be effectively zero or close to it, when considering public domain and 'openly' licensed books that allow redistribution and that have already been digitized.\nBut this approach comes with some clear limitations. First, as noted above, for many books in the public domain, their status as such is not always clear. And with respect to permissively licensed books, it is not always clear whether and how to comply with the license obligations in this context.\nSetting aside those challenges, the simple fact is that relying on public domain and existing permissively licensed books would limit the quantity and diversity of data available for training, impacting performance along different dimensions. Only a small fraction of books ever published fall into this category, and the corpus of books in this category is likely to be skewed heavily towards older public domain books. This skew would, in turn, impact the content available for AI training. For instance, relying on books from before 1929 would not 30 only incorporate outdated language patterns, but also a range of biases and misconceptions about race and gender, among other things. Efforts could be made to get people to permissively license more material - a book drive for permissive licensing, so to speak; this approach would still not encompass most books, at least when it comes to past works. 31", - "page_start": 13, - "page_end": 13, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "The CC0 Public Domain Dedication\nUse this universal tool if you are a holder of copyright or database rights, and wish to waive all your rights to the work worldwide.\nBy using CC0, you waive all copyright and related rights together with all associated claims and causes of action with respect to this work to the extent possible under the law.\nApplying CC0 to your work is easy. Simply visit the CC0 chooser (http://creativecommons.org/choose/zero) which will lead you through the process. When completed, you will be provided with HTML code that you can copy and paste into your website.\nYou let others copy, modify, distribute, and perform the work, even for commercial purposes, all without asking permission.\nWorks marked with the Public Domain Mark have been identified as being free of known restrictions under copyright law, including all related and neighboring rights. Anyone can copy, modify, distribute, and perform such works, even for commercial purposes, all without asking permission.\nApplying the PDM to a work is easy. Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.\nCreative Commons does not recommend this tool for works that are restricted by copyright laws in one or more jurisdictions. Consult with your legal advisor if you are unsure whether you should use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "What of the main imporvement of the Pile v2 dataset in comparison to its first version ?", - "target_page": 13, - "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "3.4.1 How to visualize graphical data from a dataset resource\nAs a result of a dataset search, the system displays on th e 'Dataset' tab all distributions (resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset can be further explored by clicking on ' Open Visualization ' under the ' Options ' button -if available.\nEuropean Data Portal Version 4.3 -User Manual\nPage 43 of 57\nAfter clicking on the ' Open Visualization ' button, the user should execute the following steps:", - "page_start": 42, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.1.5 Similarity analysis\nWe investigate the proximity between the datasets' topics to give insights about the benchmark contents. The methodology introduced by Muennighoff et al. (2022), i.e. computing an average embedding of samples from each dataset, is used to build a dataset-similarity matrix (displayed in appendix Figure 3). The distances between averaged embedding vectors of each dataset (which range from 0 . 89 to 1 in Figure 3) remain hard to interpret into a dataset semantic proximity. Thus, we complement this by observing the dataset's clouds of embedding in a 2D plane using PCA in Figure 4.\nFigures 4 and 3 seem to correlate, showing high similarity between two datasets when the same underlying data is used in different tasks. Dataset topics are pretty close, with some exceptions, such as the Syntec dataset. As more datasets are added to the benchmark, this analysis will help select new data that do not produce redundant results. It may also help to understand the link between the results and the datasets' topics.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "A.1 All datasets\nTable 3 displays the size of each dataset along with the average number of tokens per sample and their references. The dataset's content was tokenized using cl100k_base encoding. For Retrieval, the two numbers refer to the queries and the documents. For Reranking, the three numbers refer to the queries, the pairs of queries with relevant documents and the pairs of queries with irrelevant ones, respectively. The pairs of queries and documents are obtained from the 90 documents extracted. For SummEvalFr , the three numbers refer to the texts, human and machine summaries, respectively.\nFigure 3 represents the semantic similarity between each dataset. The methodology was as follows: 90 random samples per dataset are embedded using the multilingual-e5-large model. The embeddings of each dataset's samples are averaged. The similarity between each dataset is then calculated using cosine similarity as in (Muennighoff et al., 2022).\nWe complement this analysis by observing the dataset's clouds of embedding in a 2D plane using PCA in Figure 4.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "A.2 Created datasets\nSyntec Figure 5 shows an extract from the Syntec dataset with a document and a query relative to this document.\nHAL Figure 6 is an extract from the HAL dataset. Table 4 lists the distribution of classes ( domain field) for the HAL dataset on raw subset and mteb_eval subset, which is used for MTEB evaluation. Labels descriptions can be found at this URL: https://api.archivesouvertes.fr/ref/domain/?q=*:*&rows=393 or in Table 4. After pre-processing, mteb_eval covers titles from 10 domains as classes with less than 500 samples were removed. In the MTEB evaluation subset of the dataset, titles composed of 2 words or less have been removed (371 samples), resulting in an average word count of 13 . 4 . Figure 7 shows the word count distribution per title. Furthermore, the dataset has been cleaned up by manually removing all non-French titles. Additionally, it can be observed in Table 4 that in the original raw dataset, the shs and sdv classes represent by far the majority of the dataset samples with respectively 58706 samples (73%) and 11049 samples (13%). In order to\n12\nmitigate the class imbalance while preserving the majority of those classes, they have been randomly subsampled to 6701 and 4803 samples. Furthermore, baseline models have been trained and tested to assess the usability of this dataset in other tasks, such as classification and topic modeling. Table 5 shows the results obtained.\nSummEvalFr Extracts of humans and machine summaries translated in French from SummEvalFr and the original ones in English from SummEval (Fabbri et al., 2021) are shown in Figure 9. As explained in section 3.1.3, we use a LLM to evaluate the quality of translations for human summaries, we provide the prompt used with GPT-4 for this evaluation in Figure 8.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.2.2 How to filter datasets by using 'Faceted Search'\nThe user can find suitable datasets by perfo rming a 'Faceted Search' . This means the user systematically adds properties, which the desired dataset should fulfill, e.g. a dataset should be part of a specific catalogue or category. The following properties are available:\n· Countries,\n· Catalogues,\n· Categories,\n· Tags,\n· Formats,\n· Licences.\nThose facets are presented on the left side of the main dataset page. The available options for each facet always reflect the availability of it in the current set of results. The numbers in brackets indicate how many datasets in total have that property e.g. there are 117,610 datasets with a distribution in CSV format.\nEuropean Data Portal Version 4.3 -User Manual\nPage 27 of 57\nBy clicking on a facet the result set is filtered by the selected property. Multiple selections are linked together by a logical ' AND or ' OR ' .\nThe following example will find datasets which are from catalogue 'data.gov.uk' AND are in the categories ' Environment ' AND have a distribution in the formats ( 'CSV' or JSON ' ).\nFacets can be selected and deselected. In addition a key word can be entered to filter the results even more.\nEuropean Data Portal Version 4.3 -User Manual\nPage 28 of 57", - "page_start": 26, - "page_end": 27, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\n· Samples belonging to domain classes with less than 500 samples were removed, which leads us to keep only 10 classes.\n· Subsampling was performed on 2 classes containing more than 10k samples each to lower the number of samples and mitigate the unbalance of the dataset.\nMore details about this process are provided in the appendix A.2 along with some extracts in Figure 6. We make the dataset publicly available in both their raw and clean versions. We use this dataset in a clustering setup to cluster publications by their title and use the domain as ground truth. To ensure the quality of this dataset, we run 3 baseline models for classification: TF-IDF + SVM , a fine-tuned Camembert (Martin et al., 2019) and GPT-4 leveraging In-Context Learning (ICL). Furthermore, we run one baseline model for topic modeling: Latent Dirichlet Allocation (LDA) (Blei et al., 2003) and report scores in the appendix A.2.", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.2 Datasets (Data Platform)\nThe datasets section is the main access point for browsing, filtering and searching the datasets . It offers a faceted search, a full text search and a geographical search. The dataset view provides access and information to the distributions of the dataset.\nThe home page of this section appears like this:\nEuropean Data Portal Version 4.3 -User Manual\nPage 26 of 57", - "page_start": 25, - "page_end": 25, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Existing Project Example : The Pile v2 27\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile - a large, diverse, open dataset for AI training. EleutherAI developed it not only to support their own training of LLMs, but also to lower the barriers for others. 28\nAlong with data drawn from the web at large, The Pile included books from three datasets. The first dataset was the Books3 corpus referenced at the outset of this paper. The second and third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books by otherwise unpublished authors; and a 28,752 books in the public domain and published prior to 1919, drawn from a volunteer effort to digitize public domain works called Project Gutenberg.\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright notices to have the dataset taken down from various websites.\nDespite the takedown requests, the importance of books to EleutherAI and the broader community's AI research remained. In hoping to forge a path forward EleutherAI announced in 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29 Among other things, v2 would 'have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.' At the same time, it would only seek to include public domain books and permissively licensed content. As before, this corpus focuses on English language books.\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27 Common Corpus project, which includes an array of public domain books from a number of countries, at https://huggingface.co./blog/Pclanglais/common-corpus; see also https://huggingface.co./datasets/ storytracer/internet_archive_books_en ('This dataset contains more than 650,000 English public domain books (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the Open Library project.')\nSee Gao et al, supra note 8. 28", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "E.2 Finetuning\nIn Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with VideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 or a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 architecture, V-JEPA outperforms by 1 . 2% VideoMAE and +0 . 3% VideoMAEv2 on the SSv2 dataset, while obtaining comparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The MVD model achieves the best performance across models on the K400 dataset, and is trained using the image dataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD requires the processing of significantly more samples during pretraining due to the cost of training the teacher encoder networks in a pre-pre-training step.", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv3.pdf" - }, - { - "text": "E.4 Masking Strategy\nTable 16 Sample efficiency. We compare the sample efficiency of pretraining various state-of-the-art image and video models. The #Samples Seen entry corresponds to the number of samples (image or video clips) processed by the network during pretraining, which is larger than the size of the pretraining dataset for multi-epoch training. The V-JEPA results in this paper are obtained while processing an order of magnitude fewer samples than previous methods.\nOpenCLIP, Arch. = ViT-G/14. OpenCLIP, Data = LAION-2B. OpenCLIP, #Samples Seen = 39000M. DINOv2, Arch. = ViT-g/14. DINOv2, Data = LVD 142M. DINOv2, #Samples Seen = 1900M. VideoMAEv2, Arch. = ViT-g/14. VideoMAEv2, Data = UnlabeledHybrid. VideoMAEv2, #Samples Seen = 1600M. V-JEPA, Arch. = ViT-H/16 384. V-JEPA, Data = VideoMix2M. V-JEPA, #Samples Seen = 210M", - "page_start": 22, - "page_end": 22, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "Where will the 2024 AI + Energy summit take place ?", - "target_page": 1, - "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "References\n201. Fung, Brian (19 December 2023). \"Where the battle to dominate AI may be won\" (https://ww w.cnn.com/2023/12/19/tech/cloud-competition-and-ai/index.html). CNN Business . Archived (https://web.archive.org/web/20240113053332/https://www.cnn.com/2023/12/19/tech/cloudcompetition-and-ai/index.html) from the original on 13 January 2024.\n202. Metz, Cade (5 July 2023). \"In the Age of A.I., Tech's Little Guys Need Big Friends\" (https://w ww.nytimes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html). The New York Times . Archived (https://web.archive.org/web/20240708214644/https://www.nytim es.com/2023/07/05/business/artificial-intelligence-power-data-centers.html) from the original on 8 July 2024. Retrieved 5 October 2024.\n203. \"Electricity 2024 - Analysis\" (https://www.iea.org/reports/electricity-2024). IEA . 24 January 2024. Retrieved 13 July 2024.\n204. Calvert, Brian (28 March 2024). \"AI already uses as much energy as a small country. It's only the beginning\" (https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-ener gy-experts-expect-it-to-double-in-just-a-few-years). Vox . New York, New York. Archived (http s://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/2411172 1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original on 3 July 2024. Retrieved 5 October 2024.", - "page_start": 41, - "page_end": 41, - "source_file": "wikipedia3.pdf" - }, - { - "text": "References\n318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024 0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-aiseoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May 2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe ty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202 4) on 23 May 2024. Retrieved 23 May 2024.\n319. Russell & Norvig 2021, p. 9.\n320. Copeland, J., ed. (2004). The Essential Turing: the ideas that gave birth to the computer age . Oxford, England: Clarendon Press. ISBN 0-1982-5079-7.\n321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain& year_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar chive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic +brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original on 5 October 2024. Retrieved 5 October 2024.\n322. AI's immediate precursors: McCorduck (2004, pp. 51-107), Crevier (1993, pp. 27-32), Russell & Norvig (2021, pp. 8-17), Moravec (1988, p. 3)\n323. Turing's original publication of the Turing test in \"Computing machinery and intelligence\": Turing (1950) Historical influence and philosophical implications: Haugeland (1985, pp. 69), Crevier (1993, p. 24), McCorduck (2004, pp. 70-71), Russell & Norvig (2021, pp. 2, 984)\n324. Crevier (1993), pp. 47-49.", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Regulation\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only 35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". [304] A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to humanity. [311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional 41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \"not very important\" and 8% responding \"not at all important\". [312][313]\nIn November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the near and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks. [314] 28 countries including the United States, China, and the European Union issued a declaration at the start of the summit, calling for international co-operation to manage the challenges and risks of artificial intelligence. [315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety commitments on the development of AI. [317][318]", - "page_start": 20, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": "References\n290. Wiggers, Kyle (9 April 2024). \"Google open sources tools to support AI model development\" (https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-develop ment). TechCrunch . Archived (https://web.archive.org/web/20240910112401/https://techcrun ch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development/) from the original on 10 September 2024. Retrieved 14 April 2024.\n291. Heaven, Will Douglas (12 May 2023). \"The open-source AI boom is built on Big Tech's handouts. How long will it last?\" (https://www.technologyreview.com/2023/05/12/1072950/op en-source-ai-google-openai-eleuther-meta). MIT Technology Review . Retrieved 14 April 2024.\n292. Brodsky, Sascha (19 December 2023). \"Mistral AI's New Language Model Aims for Open Source Supremacy\" (https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-o pen-source-supremacy). AI Business . Archived (https://web.archive.org/web/202409052126 07/https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supre macy) from the original on 5 September 2024. Retrieved 5 October 2024.", - "page_start": 45, - "page_end": 45, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Towards a Books Data Commons for AI Training\nApril 2024", - "page_start": 0, - "page_end": 0, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "References\n155. Uesato, J. et al.: Improving mathematical reasoning with process supervision. (https://opena i.com/index/improving-mathematical-reasoning-with-process-supervision/) Archived (https:// web.archive.org/web/20240915161758/https://openai.com/index/improving-mathematical-re asoning-with-process-supervision/) 15 September 2024 at the Wayback Machine openai.com, May 31, 2023. Retrieved 2024-08-07.\n156. Srivastava, Saurabh (29 February 2024). \"Functional Benchmarks for Robust Evaluation of Reasoning Performance, and the Reasoning Gap\". arXiv:2402.19450 (https://arxiv.org/abs/2 402.19450) [cs.AI (https://arxiv.org/archive/cs.AI)].\n157. Roberts, Siobhan (25 July 2024). \"AI achieves silver-medal standard solving International Mathematical Olympiad problems\" (https://www.nytimes.com/2024/07/25/science/ai-math-al phaproof-deepmind.html). The New York Times . Archived (https://web.archive.org/web/2024 0926131402/https://www.nytimes.com/2024/07/25/science/ai-math-alphaproof-deepmind.ht ml) from the original on 26 September 2024. Retrieved 7 August 2024.\n158. LLEMMA . (https://blog.eleuther.ai/llemma/) eleuther.ai. Retrieved 2024-08-07.\n159. AI Math. (https://julius.ai/home/ai-math) Archived (https://web.archive.org/web/20241005165 649/https://julius.ai/home/ai-math) 5 October 2024 at the Wayback Machine Caesars Labs, 2024. Retrieved 2024-08-07.", - "page_start": 37, - "page_end": 37, - "source_file": "wikipedia3.pdf" - }, - { - "text": "(5) Net Assets\nNet assets with donor restrictions at June 30, 2024 and 2023 are available for the following purposes:\nRestricted to future periods:, 2024 = $ 50,000. Restricted to future periods:, 2023 = 100,000. Restricted by purpose:, 2024 = . Restricted by purpose:, 2023 = . Abstract Wikipedia, 2024 = 861,008. Abstract Wikipedia, 2023 = 1,249,004. Artificial intelligence, 2024 = 239,878. Artificial intelligence, 2023 = -. Endowment support, 2024 = -. Endowment support, 2023 = 1,297,620. Future Audiences, 2024 = 500,000. Future Audiences, 2023 = -. Knowledge equity, 2024 = 965,910. Knowledge equity, 2023 = 2,228,134. Machine learning, 2024 = 24,528. Machine learning, 2023 = 860,620. Media Wiki, 2024 = 1,500,000. Media Wiki, 2023 = -. Other, 2024 = 125,000. Other, 2023 = 147,295. Restricted to future periods and by purpose:, 2024 = . Restricted to future periods and by purpose:, 2023 = . Artificial intelligence, 2024 = 1,430,000. Artificial intelligence, 2023 = -. Net assets with donor restrictions, 2024 = $ 5,696,324. Net assets with donor restrictions, 2023 = 5,782,673", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "References\n315. \"The Bletchley Declaration by Countries Attending the AI Safety Summit, 1-2 November 2023\" (https://web.archive.org/web/20231101123904/https://www.gov.uk/government/public ations/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countrie s-attending-the-ai-safety-summit-1-2-november-2023). GOV.UK . 1 November 2023. Archived from the original (https://www.gov.uk/government/publications/ai-safety-summit-20 23-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-s ummit-1-2-november-2023) on 1 November 2023. Retrieved 2 November 2023.\n316. \"Countries agree to safe and responsible development of frontier AI in landmark Bletchley Declaration\" (https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible -development-of-frontier-ai-in-landmark-bletchley-declaration). GOV.UK (Press release). Archived (https://web.archive.org/web/20231101115016/https://www.gov.uk/government/ne ws/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchle y-declaration) from the original on 1 November 2023. Retrieved 1 November 2023.\n317. \"Second global AI summit secures safety commitments from companies\" (https://www.reuter s.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-2 1). Reuters. 21 May 2024. Retrieved 23 May 2024.", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "References\n293. Edwards, Benj (22 February 2024). \"Stability announces Stable Diffusion 3, a next-gen AI image generator\" (https://arstechnica.com/information-technology/2024/02/stability-announc es-stable-diffusion-3-a-next-gen-ai-image-generator). Ars Technica . Archived (https://web.ar chive.org/web/20241005170201/https://arstechnica.com/information-technology/2024/02/sta bility-announces-stable-diffusion-3-a-next-gen-ai-image-generator/) from the original on 5 October 2024. Retrieved 14 April 2024.\n294. Marshall, Matt (29 January 2024). \"How enterprises are using open source LLMs: 16 examples\" (https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-exa mples). VentureBeat . Archived (https://web.archive.org/web/20240926171131/https://ventur ebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples/) from the original on 26 September 2024. Retrieved 5 October 2024.\n295. Piper, Kelsey (2 February 2024). \"Should we make our most powerful AI models open source to all?\" (https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial -intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake). Vox . Archived (https://web.archi ve.org/web/20241005170204/https://www.vox.com/future-perfect/2024/2/2/24058484/open-s ource-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake) from the original on 5 October 2024. Retrieved 14 April 2024.", - "page_start": 45, - "page_end": 45, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "What is the United States SCSP ?", - "target_page": 1, - "target_passage": "he Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "2.5.2 Creating an instance on z/OS\nIn this section, we explain how to create an instance on the z/OS system. To do so, complete the following steps:\n1. Copy the control files.\n2. Verify the ARS.INI file.\n3. Verify the ARS.CFG file.\n4. Modify the ARS.CACHE file.\n5. Verify the CLI.INI file.\n6. Modify the ARSSOCKD procedure.\n7. Modify the ARSLOAD procedure.\nYou can mount the Content Manager OnDemand installation directory at any mount point other than /usr/lpp/ars/V9R5M0 . You can run at different service levels with this flexibility. For example, a symmetric multiprocessor (SMP) might be used to install into SERVICE/usr/lpp/ars/V9R5M0 . SERVICE/usr/lpp/ars/V9R5M0 might be copied into /usr/lpp/ars/V9R5M0/maint for testing. When testing is complete,\n/usr/lpp/ars/V9R5M0/maint might be copied into /usr/lpp/ars/V9R5M0 for production.", - "page_start": 61, - "page_end": 61, - "source_file": "sg246915.pdf" - }, - { - "text": "11.5 Customized functions (Multiplatforms and z/OS only)\nTable 11-1 Exits and their initial locations\narsuload arsuprep arsuupdt arsutbl, Location = Content Manager OnDemand V8.5: /SM590000 Windows: C:\\Program Files\\IBM\\OnDemand for Windows\\bin\\exits /SM590000 AIX: /usr/lpp/ars/bin/exits /SM590000 Solaris, HPUX, and Linux: /opt/ondemand/bin/exits /SM590000 z/OS: /usr/lpp/ars/exits or ARS.V8R5M0.SARSINST. , Location = Content Manager OnDemand V9.0: /SM590000 Windows: C:\\Program Files\\IBM\\OnDemand for Windows\\V9.0\\bin\\exits /SM590000 AIX, Solaris, and HPUX: /opt/IBM/ondemand/V9.0/bin/exits /SM590000 Linux and Linux on System z: /opt/ibm/ondemand/V9.0/bin /SM590000 z/OS: /usr/lpp/ars/V9R0M0/exits or ARS.V9R0M0.SARSINST. , Location = Content Manager OnDemand V9.5: /SM590000 Windows: C:\\Program Files\\IBM\\OnDemand for Windows\\V9.5\\bin\\exits /SM590000 AIX, Solaris, and HPUX: /opt/IBM/ondemand/V9.5/bin/exits /SM590000 Linux and Linux on System z: /opt/ibm/ondemand/V9.5/bin /SM590000 z/OS: /usr/lpp/ars/V9R5M0/exits or ARS.V9R5M0.SARSINST", - "page_start": 286, - "page_end": 286, - "source_file": "sg246915.pdf" - }, - { - "text": "Starting the new instance\nWhen everything is set up, you can start the new instance by customizing the sample procedure in the SARSINST library to conform to your environment.\nFigure 2-11 shows an example of starting the new instance.\n//ARS95037 PROC PARML= //* //* Library: USER.PRIVATE.PROCLIB(ARS95037) //* //ARS95037 EXEC PGM=ARSSOCKD,REGION=0M,TIME=NOLIMIT, // PARM=('/VERBOSE ARC95037') //STEPLIB DD DISP=SHR,DSN=ARS.ARSV950.SARSLOAD // DD DISP=SHR,DSN=DSN.DB2V910.SDSNEXIT // DD DISP=SHR,DSN=DSN.DB2V910.SDSNLOAD // DD DISP=SHR,DSN=DSN.DB2V910.SDSNLOD2 //ARSBIN DD PATH='/usr/lpp/ars/V9R5M0/bin' //DSNAOINI DD PATH='/etc/ars/cli937.ini' //SYSPRINT DD SYSOUT=* //SYSOUT DD SYSOUT=*\nFigure 2-11 Sample Content Manager OnDemand procedure\nAfter this procedure is started, log on to the new instance by using the different port number and create users, application groups, applications, and storage sets with the normal procedures.", - "page_start": 66, - "page_end": 66, - "source_file": "sg246915.pdf" - }, - { - "text": "Planning for host attachments\nAn iSCSI client, which is known as an iSCSI initiator , sends SCSI commands over an IP network to an iSCSI target. A single iSCSI initiator or iSCSI target is called an iSCSI node .\nYou can use the following types of iSCSI initiators in host systems:\n/SM590000 Software initiator: Available for most operating systems (OS), including AIX, Linux, and Windows.\n/SM590000 Hardware initiator: Implemented as a network adapter with an integrated iSCSI processing unit, which is also known as an iSCSI HBA .\nMake sure that iSCSI initiators, targets, or both that you plan to use are supported. Use the following websites for reference:\n/SM590000 IBM Storwize V7000 V8.1 Support page\n/SM590000 IBM Knowledge Center for IBM Storwize V7000\n/SM590000 hIBM System Storage Interoperation Center (SSIC)", - "page_start": 83, - "page_end": 83, - "source_file": "sg247938.pdf" - }, - { - "text": "Other resources\nThe following publications are also relevant as further information sources:\n/SM590000 IBM System Storage Master Console: Installation and User's Guide , GC30-4090\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: CIM Agent Developers Reference , SC26-7545\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: Command-Line Interface User's Guide , SC26-7544\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: Configuration Guide , SC26-7543\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: Host Attachment Guide , SC26-7563\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: Installation Guide , SC26-7541\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: Planning Guide , GA22-1052\n/SM590000 IBM System Storage Open Software Family SAN Volume Controller: Service Guide , SC26-7542\n/SM590000 IBM System Storage SAN Volume Controller - Software Installation and Configuration Guide, SC23-6628\n/SM590000 IBM System Storage SAN Volume Controller V6.2.0 - Software Installation and Configuration Guide, GC27-2286\n/SM590000 IBM System Storage SAN Volume Controller 6.2.0 Configuration Limits and Restrictions , S1003799\n/SM590000 IBM TotalStorage Multipath Subsystem Device Driver User's Guide , SC30-4096\n/SM590000 IBM XIV and SVC Best Practices Implementation Guide\nhttp://ibm.co/1bk64gW\n/SM590000 Considerations and Comparisons between IBM SDD for Linux and DM-MPIO\nhttp://ibm.co/1CD1gxG", - "page_start": 811, - "page_end": 811, - "source_file": "sg247938.pdf" - }, - { - "text": "2.5.1 Installation overview\nThe path for the Content Manager OnDemand system is /usr/lpp/ars/V9R5M0 (on z/OS) and /opt/IBM/ondemand/V 9.5 (on UNIX). From the ars directory, several directories contain the Content Manager OnDemand files and executable files, such as programs and procedures. The directories are created during the installation when you run the ARSMKDIR REXX routine from the installation library, ARS.V9R5M0.SARINST . The /usr/lpp/ars/V9R5M0 directory contains the subdirectories that are listed in Table 2-3.\nTable 2-3 Subdirectories of /usr/lpp/ars", - "page_start": 60, - "page_end": 60, - "source_file": "sg246915.pdf" - }, - { - "text": "iSCSI target\nAn iSCSI target is a storage resource on an iSCSI server.", - "page_start": 800, - "page_end": 800, - "source_file": "sg247938.pdf" - }, - { - "text": "Stash file information for z/OS\nTo use arsstash with Content Manager OnDemand for z/OS, the Integrated Cryptographic Service Facility (ICSF) must be available on the z/OS system to provide AES-128 encryption. The encryption can be performed in either software or hardware.\nIn the examples, a started task name of CSF is used. If CSF is not running, when you try to create a stash file, you get the following message, which does not identify the problem:\nVerify OnDemand Password: ARS1602E The stash file >/u/myuser/prodstash.stash< is invalid. /usr/lpp/ars/V9R5M0/bin: >\nTo verify that CSF is up and running so that Content Manager OnDemand V9.5 can use it, use the MODIFY command against ARSSOCKD .\nOn a system where ICSF is up and running, run the following command:\nF ARSSOCKD,D,ICSF ARS0438I 15.21.18 DISPLAY ICSF CSFIQF RC=00, RSN=00000000, AES=3, FMID=HCR7780\nOn a system where CSF is not running, run the following command:\nF ARSSOCKD,D,ICSF ARS0438I 15.28.36 DISPLAY ICSF CSFIQF RC=12, RSN=00000000, AES=0, FMID=N/A", - "page_start": 172, - "page_end": 172, - "source_file": "sg246915.pdf" - }, - { - "text": "C. Marginal Fermi liquid model\nFIG. 10: Top -the conductivities in the NS and SCS in the original MFLI model of Ref.30. We set Γ = 70 meV , α = 0 . 75, ∆ = 32 meV , ω 1 = 71 meV . Note that σ ' ( ω ) in the SCS begins at Ω = ∆ + ω 1 . Bottom - the behavior of W K with Γ.\nIn Fig 10 we plot the conductivities in the NS and the SCS and Kubo sums W K vs Γ at α = 0 . 75 showing that the spectral weight in the SCS is indeed larger than in the NS. In Fig 11 we show the behavior of the optical sums W ( ω c ) in NS and SCS. The observation here is that only ∼ 75 -80%of the Kubo sum is recovered up to the scale of the bandwidth implying that there is indeed a significant spectral weight well beyond the bandwidth. And in Fig 12 we show the behavior of ∆ W ( w c ). We see that it does not change sign and remain positive at all ω c , very much unlike the BCS case. Comparing the behavior of W ( w c ) with and without a lattice (solid and dashed lines in Fig. 12) we see that the 'finite bandwidth effect' just shifts the curve in the positive direction. We also see that the solid line flattens above roughly half of the bandwidth, i.e., at these frequencies ∆ W ( ω c ) ≈ ∆ W K . Still, we found that ∆ W continues going down even above the bandwidth and truly saturates only at about 2 eV (not shown in the figure) supporting the idea that there is 'more' left to recover from higher frequencies.\nThe rationale for ∆ W K > 0 in the original MFLI model has been provided in Ref. 30. They argued that this is closely linked to the absence of quasiparticle peaks in the NS and their restoration in the SCS state because the phase space for quasiparticle scattering at low energies is smaller in a superconductor than in a normal state.\n1\nFIG. 11: The evolution of the optical integral in the NS (top) and the SCS (bottom) in the original MFLI model. Parameters are the same as above. Note that only ∼ 75 -80% of the spectral weight is recovered up to 1 eV .", - "page_start": 7, - "page_end": 8, - "source_file": "1001.0764.pdf" - }, - { - "text": "Environmental Issues\nThe Group is committed to the environmentally sustainable development of its operations and, while the Group's operations are subject to significant environmental regulation under the laws of the states in which we operate and the United States of America, no notice of any breach has been received and the Directors believe no material breach of any environment regulations has occurred. The Company maintains strict internal performance and reporting guidelines to capture all spills and emissions. Additionally, a third party firm is used to conduct quarterly environmental inspections to ensure the company is meeting both internal and external standards.\nIn the Group's Oklahoma asset, significant company and regulatory scrutiny has been placed on seismic events in proximity to salt water disposal wells ('SWDs'). Prior to the development and operation of our SWDs, the company undertook a study of the state approved disposal zones and successfully drilled and completed its SWDs in state approved zones that accept sufficient volumes of water to meet the company's operational objectives while minimizing the potential risk of seismic events. During 2014, all of the Group's SWDs were reviewed and approved by the state regulatory agency.\nDuring 2014 the Group undertook a review of its operations in Texas and has identified two main opportunities to reduce its environmental impact: 1) water recycling and re-use for completion operations in the Eagle Ford; and 2) more efficient and less environmentally impactful treatment of hydrogen sulphide (H2S) from the company's natural gas production in the Eagle Ford. During 2015 the Company expects to implement operational changes to capitalize on these opportunities to reduce its environmental impact.", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "What are some example of uses AI by the US departement of energy ?", - "target_page": 1, - "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Defining artificial intelligence\nSome authors have suggested in practice, that the definition of AI is vague and difficult to define, with contention as to whether classical algorithms should be categorised as AI, [367] with many companies during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not actually use AI in a material way\". [368]", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "AI welfare and rights\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), and if so, to what degree. [388] But if there is a significant chance that a given machine can feel and suffer, then it may be entitled to certain rights or welfare protection measures, similarly to animals. [389][390] Sapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may provide another moral basis for AI rights. [389] Robot rights are also sometimes proposed as a practical way to integrate autonomous agents into society. [391]\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI systems. Similarly to the legal status of companies, it would have conferred rights but also responsibilities. [392] Critics argued in 2018 that granting rights to AI systems would downplay the importance of human rights, and that legislation should focus on user needs rather than speculative futuristic scenarios. They also noted that robots lacked the autonomy to take part to society on their own. [393][394]\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI sentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot analogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created and carelessly exploited. [390][389]", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Regulation\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only 35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". [304] A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to humanity. [311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional 41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \"not very important\" and 8% responding \"not at all important\". [312][313]\nIn November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the near and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks. [314] 28 countries including the United States, China, and the European Union issued a declaration at the start of the summit, calling for international co-operation to manage the challenges and risks of artificial intelligence. [315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety commitments on the development of AI. [317][318]", - "page_start": 20, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Artificial intelligence\nArtificial intelligence ( AI ), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. [1] Such machines may be called AIs.\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, many AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.\" [2][3]\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural language processing, perception, and support for robotics. [a] General intelligence-the ability to complete any task performed by a human on an at least equal level-is among the field's long-term goals. [4] To reach these goals, AI researchers have adapted and integrated a wide range of techniques, including search and mathematical optimization, formal logic, artificial neural networks, and methods based on statistics, operations research, and economics. [b] AI also draws upon psychology, linguistics, philosophy, neuroscience, and other fields. [5]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Regulation\nThe regulation of artificial intelligence is the development of public sector policies and laws for promoting and regulating AI; it is therefore related to the broader regulation of algorithms. [302] The regulatory and policy landscape for AI is an emerging issue in jurisdictions globally. [303] According to AI Index at Stanford, the annual number of AI-related laws passed in the 127 survey countries jumped from one passed in 2016 to 37 passed in 2022 alone. [304][305] Between 2016 and 2020, more than 30 countries adopted dedicated strategies for AI. [306] Most EU member states had released national AI strategies, as had Canada, China, India, Japan, Mauritius, the Russian Federation, Saudi Arabia, United Arab Emirates, U.S., and\nThe first global AI Safety Summit was held in 2023 with a declaration calling for international cooperation.\nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia and Tunisia. [306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a need for AI to be developed in accordance with human rights and democratic values, to ensure public confidence and trust in the technology. [306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher published a joint statement in November 2021 calling for a government commission to regulate AI. [307] In 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they believe may happen in less than 10 years. [308] In 2023, the United Nations also launched an advisory body to provide recommendations on AI governance; the body comprises technology company executives, governments officials and academics. [309] In 2024, the Council of Europe created the first international legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence and Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United States, the United Kingdom, and other signatories. [310]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "The top AI-powered tech trends in 2025\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From enhancing our daily routines to transforming entire industries, AI's impact is undeniable.\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and personalization.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Agents\nArtificial intelligent (AI) agents are software entities designed to perceive their environment, make decisions, and take actions autonomously to achieve specific goals. These agents can interact with users, their environment, or other agents. AI agents are used in various applications, including virtual assistants, chatbots, autonomous vehicles, game-playing systems, and industrial robotics. AI agents operate within the constraints of their programming, available computational resources, and hardware limitations. This means they are restricted to performing tasks within their defined scope and have finite memory and processing capabilities. In real-world applications, AI agents often face time constraints for decision-making and action execution. Many AI agents incorporate learning algorithms, enabling them to improve their performance over time through experience or training. Using machine learning, AI agents can adapt to new situations and optimise their behaviour for their designated tasks. [175][176][177]\nVincent van Gogh in watercolour created by generative AI software", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Other industry-specific tasks\nThere are also thousands of successful AI applications used to solve specific problems for specific industries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in some offerings or processes. [178] A few examples are energy storage, medical diagnosis, military logistics, applications that predict the result of judicial decisions, foreign policy, or supply chain management.\nAI applications for evacuation and disaster management are growing. AI has been used to investigate if and how people evacuated in large scale and small scale evacuations using historical data from GPS, videos or social media. Further, AI can provide real time information on the real time evacuation conditions. [179][180][181]\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments or increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict the ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct predictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests, and save water.\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and applications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the development of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting solar activity, and distinguishing between signals and instrumental effects in gravitational wave astronomy. Additionally, it could be used for activities in space, such as space exploration, including the analysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance, and more autonomous operation.\nDuring the 2024 Indian elections, US$50 millions was spent on authorized AI-generated content, notably by creating deepfakes of allied (including sometimes deceased) politicians to better engage with voters, and by translating speeches to various local languages. [182]", - "page_start": 11, - "page_end": 12, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Evaluating approaches to AI\nNo established unifying theory or paradigm has guided AI research for most of its history. [aa] The unprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much so that some sources, especially in the business world, use the term \"artificial intelligence\" to mean \"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics argue that these questions may have to be revisited by future generations of AI researchers.", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "How can I contact Investor Relations of HON industries through email ?", - "target_page": 63, - "target_passage": "E-mail: investorrelations@honi.com", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "I NVESTOR RELATIONS\nSend inquiries to:\nInvestor Relations\nHON INDUSTRIES Inc.\n414 East Third Street\nMuscatine, IA 52761\nTelephone: 563.264.7400\nFax: 563.264.7655\nE-mail: investorrelations@honi.com", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Stan A. Askren\nPresident, HON INDUSTRIES Inc.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "INVESTOR RELATIONS\nInstitutional investors, securities analysts and others requiring additional financial information can visit rogers.com/investors or contact us at:", - "page_start": 129, - "page_end": 129, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "SUBSIDIARIES\nDavid C. Burdakin\nExecutive Vice President, HON INDUSTRIES, Inc.\nPresident, The HON Company", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "General Manager Corporate and Markets\nJoel Forwood joined Kingsgate in November 2010 and has over 27 years experience in the resource and investment industries covering investor relations, funds management and exploration. For over 12 years, he has been leading investor relations at a number of listed companies, most recently for Lihir Gold Limited. Prior to this he was a fund manager with Queensland Investment Corporation (QIC) following his early career in mineral exploration with BHP and corporate development with RGC.", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "CORPORATE HEADQUARTERS\nHON INDUSTRIES Inc.\n414 East Third Street\nP.O. Box 1109\nMuscatine, IA 52761-0071\nTelephone: 563.264.7400\nFax: 563.264.7217\nWebsite: www.honi.com", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Jack D. Michaels\nChairman and Chief Executive Officer, HON INDUSTRIES Inc.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "HON INDUSTRIES INC. OFFICERS\nJack D. Michaels\nChairman and Chief Executive Officer", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "T O O U R S T A K E H O L D E R S :\nWhen our company is appreciated by its members, favored by its customers, supported by its suppliers, respected by the public, and admired by its shareholders, this Vision is fulfilled.\nHON INDUSTRIES Inc. (HNI) 414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071\nwww.honi.com", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Investments in Non-Affiliated Companies\nThe Company has investments in several available-for-sale securities, which the Company may choose to liquidate from time to time, based on market conditions, capital needs, other investment opportunities, or a combination of any number of these factors. As a result of the uncertainty of these factors, there is also uncertainty as to what the value of the investments may be when they are sold.\nThe fair value of the Company's available-for-sale securities was $0.2 million at the end of 2003, compared to $0.2 million at the end of 2002. The Company's available-for-sale portfolio at December 31, 2003 is made up of two investments, both of which are within the telecommunications industry. Due to the volatility of the securities markets, particularly in the telecommunications industry, there is uncertainty about the ultimate value the Company will realize with respect to these investments in the future.\nThe Company participates in emerging technologies by investing in entities that invest in start-up companies. This includes indirect participation through capital venture funds of South Atlantic Venture Fund III, South Atlantic Private Equity IV, Dolphin Communications Parallel Fund, Dolphin Communications Fund II and the Burton Partnership. The Company also participates by direct investment in privately held companies. Currently the Company's only direct investment is in NTC Communications, a provider of voice, video and data connections to off campus housing properties at universities and colleges. For those companies that eventually make public offerings of their securities, it\n51\n■\n2003 ANNUAL REPORT", - "page_start": 52, - "page_end": 52, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "What explains the decrease in net sales of HON industries in 2002 ?", - "target_page": 34, - "target_passage": "The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "NET INCOME\nNet income increased 7% in 2003 and 23% in 2002, respectively. Net income in 2003 was favorably impacted by increased interest income due to increased investments and decreased interest expense due to reduction in debt. Net income in 2002 was favorably impacted by a decrease in interest expense and a decrease in the effective tax rate to 35% in 2002 from 36% in 2001 mainly due to tax benefits associated with various federal and state tax credits. The Company anticipates that its tax rate will increase to 36% in 2004 due to increased state taxes and a reduced benefit from federal and state tax credits. Net income per diluted share increased by 8% to $1.68 in 2003 and by 23% to $1.55 in 2002, respectively. Due to the appreciation in the Company's stock price, outstanding options had a dilutive impact of $0.01 per share in 2003.\n35\nHON INDUSTRIES Inc. and SUBSIDIARIES", - "page_start": 34, - "page_end": 35, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "NET SALES\nNet sales increased 3.7% in 2003 and decreased 5.6% in 2002. The increase in 2003 was due to the extra week in 2003 as a result of the Company's 52/53-week fiscal year and strong performance in the hearth products segment. The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment.", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "CONSOLIDATED STATEMENTS OF CASH FLOWS\n2001 = -. Sales or maturities of long-term investments, 2003 = 15,000. Sales or maturities of long-term investments, = -. Sales or maturities of long-term investments, 2002 2001 = -. Other - net, 2003 = -. Other - net, = 924. Other - net, 2002 2001 = 343. Net cash flows from (to) investing activities, 2003 = (81,478). Net cash flows from (to) investing activities, = (63,896). Net cash flows from (to) investing activities, 2002 2001 = (47,013). NET CASH FLOWS FROM (TO) FINANCING ACTIVITIES:, 2003 = . NET CASH FLOWS FROM (TO) FINANCING ACTIVITIES:, = . NET CASH FLOWS FROM (TO) FINANCING ACTIVITIES:, 2002 2001 = . Purchase of HON INDUSTRIES common stock, 2003 = (21,512). Purchase of HON INDUSTRIES common stock, = (15,736). Purchase of HON INDUSTRIES common stock, 2002 2001 = (35,059). Proceeds from long-term debt, 2003 = 761. Proceeds from long-term debt, = 825. Proceeds from long-term debt, 2002 2001 = 36,218. Payments of note and long-term debt, 2003 = (20,992). Payments of note and long-term debt, = (35,967). Payments of note and long-term debt, 2002 2001 = (87,365). Proceeds from sale of HON INDUSTRIES common stock, 2003 = 12,063. Proceeds from sale of HON INDUSTRIES common stock, = 2,096. Proceeds from sale of HON INDUSTRIES common stock, 2002 2001 = 9,449. Dividends paid, 2003 = (30,299). Dividends paid, = (29,386). Dividends paid, 2002 2001 = (28,373). Net cash flows from (to) financing activities, 2003 = (59,979). Net cash flows from (to) financing activities, = (78,168). Net cash flows from (to) financing activities, 2002 2001 = (105,130). Net increase (decrease) in cash and cash equivalents, 2003 = (183). Net increase (decrease) in cash and cash equivalents, = 60,327. Net increase (decrease) in cash and cash equivalents, 2002", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "YEAR ENDED JUNE 30, 2012 vs. 2011\nThe following table is included to aid in review of Applied's statements of consolidated income.\nNet Sales, Year Ended June 30, As a % of Net Sales.2012 = 100.0 %. Net Sales, Year Ended June 30, As a % of Net Sales.2011 = 100.0 %. Net Sales, Change in $'s Versus Prior Period.% Increase = 7.3 %. Gross Profit, Year Ended June 30, As a % of Net Sales.2012 = 27.6 %. Gross Profit, Year Ended June 30, As a % of Net Sales.2011 = 27.7 %. Gross Profit, Change in $'s Versus Prior Period.% Increase = 6.7 %. Selling, Distribution & Administrative, Year Ended June 30, As a % of Net Sales.2012 = 20.5 %. Selling, Distribution & Administrative, Year Ended June 30, As a % of Net Sales.2011 = 20.9 %. Selling, Distribution & Administrative, Change in $'s Versus Prior Period.% Increase = 5.1 %. Operating Income, Year Ended June 30, As a % of Net Sales.2012 = 7.1 %. Operating Income, Year Ended June 30, As a % of Net Sales.2011 = 6.8 %. Operating Income, Change in $'s Versus Prior Period.% Increase = 11.7 %. Net Income, Year Ended June 30, As a % of Net Sales.2012 = 4.6 %. Net Income, Year Ended June 30, As a % of Net Sales.2011 = 4.4 %. Net Income, Change in $'s Versus Prior Period.% Increase = 12.4 %\nNet sales in fiscal 2012 were $2.4 billion, which was $162.6 million or 7.3% above the prior year, driven by improvements in the industrial economy as well as a continued focus on profitable sales growth. Incremental net sales from companies acquired since the prior year period contributed approximately $16.6 million or 0.7%. Currency translation decreased fiscal year sales by approximately $1.8 million or 0.1%. In local currency, net sales from our Canadian operations were up 12.2% from fiscal 2011, including 2.8% from acquisitions. In local currency, net sales from our Mexican operations were up 25.9%. The number of selling days in fiscal 2012 was the same as in fiscal 2011.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "YEAR ENDED JUNE 30, 2011 vs. 2010\nThe following table is included to aid in review of Applied's statements of consolidated income.\nNet Sales, Year Ended June 30, As a % of Net Sales.2011 = 100.0 %. Net Sales, Year Ended June 30, As a % of Net Sales.2010 = 100.0 %. Net Sales, Change in $'s Versus Prior Period.% Increase = 16.9 %. Gross Profit, Year Ended June 30, As a % of Net Sales.2011 = 27.7 %. Gross Profit, Year Ended June 30, As a % of Net Sales.2010 = 27.2 %. Gross Profit, Change in $'s Versus Prior Period.% Increase = 18.9 %. Selling, Distribution & Administrative, Year Ended June 30, As a % of Net Sales.2011 = 20.9 %. Selling, Distribution & Administrative, Year Ended June 30, As a % of Net Sales.2010 = 21.4 %. Selling, Distribution & Administrative, Change in $'s Versus Prior Period.% Increase = 14.0 %. Operating Income, Year Ended June 30, As a % of Net Sales.2011 = 6.8 %. Operating Income, Year Ended June 30, As a % of Net Sales.2010 = 5.8 %. Operating Income, Change in $'s Versus Prior Period.% Increase = 37.0 %. Net Income, Year Ended June 30, As a % of Net Sales.2011 = 4.4 %. Net Income, Year Ended June 30, As a % of Net Sales.2010 = 3.5 %. Net Income, Change in $'s Versus Prior Period.% Increase = 46.8 %\nNet sales in fiscal 2011 were $2.2 billion, which was $319.6 million or 16.9% above the prior year driven by improvements in the industrial economy. Incremental net sales from companies acquired in fiscal 2011 contributed approximately $40.8 million or 1.8%. Currency translation increased fiscal year 2012 sales by approximately $16.3 million or 0.7%. In local currency, net sales from our Canadian operations were up 23.1% from fiscal 2010, including 8.4% from acquisitions. In local currency, net sales from our Mexican operations were up 17.9%. The number of selling days in fiscal 2011 was the same as in fiscal 2010.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "FINANCIAL HIGHLIGHTS\nI N C O M E S T A T E M E N T D A T A, 2003 = . I N C O M E S T A T E M E N T D A T A, = . I N C O M E S T A T E M E N T D A T A, 2002 Change = . Net sales, 2003 = $ 1,755,728. Net sales, = $ 1,692,622. Net sales, 2002 Change = 3.7%. Gross profit, 2003 = 639,215. Gross profit, = 599,879. Gross profit, 2002 Change = 6.6%. Gross profit as a % of:, 2003 = . Gross profit as a % of:, = . Gross profit as a % of:, 2002 Change = . Net sales, 2003 = 36.4%. Net sales, = 35.4%. Net sales, 2002 Change = -. Selling and administrative expenses, 2003 = 480,744. Selling and administrative expenses, = 454,189. Selling and administrative expenses, 2002 Change = 5.8%. Restructuring related charges, 2003 = 8,510. Restructuring related charges, = 3,000. Restructuring related charges, 2002 Change = 183.7%. Operating income, 2003 = 149,961. Operating income, = 142,690. Operating income, 2002 Change = 5.1%. Net income, 2003 = 98,105. Net income, = 91,360. Net income, 2002 Change = 7.4%. Net income as a % of:, 2003 = . Net income as a % of:, = . Net income as a % of:, 2002 Change = . Net sales, 2003 = 5.6%. Net sales, = 5.4%. Net sales, 2002 Change = -. Average shareholders' equity, 2003 = 14.5%. Average shareholders' equity, = 14.7%. Average shareholders' equity, 2002 Change = -. Per common share:, 2003 = . Per common share:, = . Per common share:, 2002 Change = . Net income - basic, 2003 = $ 1.69. Net income - basic, = $ 1.55. Net income - basic, 2002 Change = 9.0%. Net income - diluted, 2003 = 1.68. Net income - diluted, = 1.55. Net income - diluted, 2002", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\n= 2%. Other, 2012.Net sales = 286. Other, 2012.% of total = 3%. Total net sales, 2014.Net sales = $13,110. Total net sales, 2014.% of total = 100%. Total net sales, 2013.Net sales = $12,166. Total net sales, 2013.% of total = 100%. Total net sales, 2012.Net sales = $11,762. Total net sales, 2012.% of total = 100%\n64\nDollar and share amounts in millions except per share, per option and per unit amounts", - "page_start": 75, - "page_end": 76, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Results of Operations\nThe following table sets forth the percentage of consolidated net sales represented by certain items reflected in the Company's statements of income for the periods indicated.\nNet sales, 2003 = 100.0%. Net sales, 2002 = 100.0%. Net sales, 2001 = 100.0%. Cost of products sold Gross profit, 2003 = 63.6 36.4. Cost of products sold Gross profit, 2002 = 64.6 35.4. Cost of products sold Gross profit, 2001 = 65.9 34.1. Selling and administrative expenses, 2003 = 27.4. Selling and administrative expenses, 2002 = 26.8. Selling and administrative expenses, 2001 = 25.9. Restructuring related charges, 2003 = 0.5. Restructuring related charges, 2002 = 0.2. Restructuring related charges, 2001 = 1.3. Operating income, 2003 = 8.5. Operating income, 2002 = 8.4. Operating income, 2001 = 6.9. Interest income (net), 2003 = 0.1. Interest income (net), 2002 = (0.1). Interest income (net), 2001 = (0.4). Income before income taxes, 2003 = 8.6. Income before income taxes, 2002 = 8.3. Income before income taxes, 2001 = 6.5. Income taxes, 2003 = 3.0. Income taxes, 2002 = 2.9. Income taxes, 2001 = 2.3. Net income, 2003 = 5.6%. Net income, 2002 = 5.4%. Net income, 2001 = 4.2%", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Net Sales\n(Billion Yen)", - "page_start": 2, - "page_end": 2, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Summary\nNet sales, 2014.Amount = $13,110. Net sales, 2014.% of net sales 1 = 100.0%. Net sales, 2013.Amount = $12,166. Net sales, 2013.% of net sales 1 = 100.0%. Net sales, 2012.Amount = $11,762. Net sales, 2012.% of net sales 1 = 100.0%. Cost of sales and related buying and occupancy costs, 2014.Amount = (8,401). Cost of sales and related buying and occupancy costs, 2014.% of net sales 1 = (64.1%). Cost of sales and related buying and occupancy costs, 2013.Amount = (7,732). Cost of sales and related buying and occupancy costs, 2013.% of net sales 1 = (63.6%). Cost of sales and related buying and occupancy costs, 2012.Amount = (7,427). Cost of sales and related buying and occupancy costs, 2012.% of net sales 1 = (63.1%). Gross profit, 2014.Amount = 4,709. Gross profit, 2014.% of net sales 1 = 35.9%. Gross profit, 2013.Amount = 4,434. Gross profit, 2013.% of net sales 1 = 36.4%. Gross profit, 2012.Amount = 4,335. Gross profit, 2012.% of net sales 1 = 36.9%. Selling, general and administrative expenses, 2014.Amount = (3,588). Selling, general and administrative expenses, 2014.% of net sales 1 = (27.4%). Selling, general and administrative expenses, 2013.Amount = (3,272). Selling, general and administrative expenses, 2013.% of net sales 1 = (26.9%). Selling, general and administrative expenses, 2012.Amount = (3,172). Selling, general and administrative expenses, 2012.% of net sales 1 = (27.0%). Earnings before interest and income taxes, 2014.Amount = $1,121. Earnings before interest and income taxes, 2014.% of net sales 1 = 8.6%. Earnings before interest and income taxes, 2013.Amount = $1,162. Earnings before interest and income taxes, 2013.% of net sales 1 =", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "What operations were discontinued in 1997 by Atrion Corp ?", - "target_page": 17, - "target_passage": "During 1997, the Company sold all of its natural gas operations. ", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "C o r p o r a t e O f f i c e :\nAtrion Corporation One Allentown Parkway Allen, Texas 75002 (972) 390-9800\nwww.atrioncorp.com", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its products throughout the United States and internationally. The Company's customers include hospitals, distributors, and other manufacturers. As of December 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. ('Atrion Medical Products'), Halkey-Roberts Corporation ('Halkey-Roberts') and Quest Medical, Inc. ('Quest Medical').", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "NOTE 3 - DISCONTINUED OPERATIONS\nIn June 2003, the Company entered into an agreement to sell the Golden Nugget Subsidiaries, including substantially all of the assets and liabilities of those resorts, for approximately $215 million, subject to certain working capital adjustments. This transaction closed in January 2004, with net proceeds to the Company of $210 million. Also in June 2003, the Company ceased operations of PLAYMGMMIRAGE.com, its online gaming website ('Online'). In February 2004, the Company entered into an agreement to sell the subsidiaries that own\nand operate MGM Grand Australia. This transaction closed in July 2004 with net proceeds to the Company of $136 million.\nThe results of the Golden Nugget Subsidiaries, Online and MGM Grand Australia are classified as discontinued operations in the accompanying consolidated statements of income for all periods presented. Net revenues of discontinued operations were $45 million, $231 million and $222 million, respectively, for the years ended December 31, 2004, 2003 and 2002. Included in income from discontinued operations is an allocation of interest expense based on the ratio of the net assets of the discontinued operations to the total consolidated net assets and debt of the Company. Interest allocated to discontinued operations was $2 million, $9 million and $9 million for the years ended December 31, 2004, 2003 and 2002, respectively. Included in discontinued operations for the year ended December 31, 2003 is a loss on disposal of Online of $7 million relating primarily to unrecoverable costs of computer hardware and software. Included in the tax benefit from discontinued operations for the year ended December 31, 2003 is $2 million of previously unrecognized tax benefits relating to prior year operating losses of Online. Included in discontinued operations for the year ended December 31, 2004 is a gain on the sale of the Golden Nugget Subsidiaries of $8 million and a gain on sale of the MGM Grand Australia Subsidiaries of $74 million.", - "page_start": 61, - "page_end": 62, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Discontinued Operations\nAs discussed in the Cable segment, the second quarter of 2012 was the last period of operations for our Video business, from which point the associated results were treated as discontinued operations for accounting and reporting purposes.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "DISCONTINUED OPERATIONS\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company's natural gas operations as discontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of $ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001.\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to $250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon revenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from the purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 gain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. This reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.\n25\nM A N A G E M E N T ' S D I S C U S S I O N", - "page_start": 26, - "page_end": 27, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "2003 Revenues by Product Line\nOur financial performance earned recognition from Investors Business Daily , which ranked Atrion sixth on its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than doubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price has increased by 468 percent.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "PRINCIPLES OF CONSOLIDATION\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the 'Company'). All significant intercompany transactions and balances have been eliminated in consolidation.", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "F o r m 1 0 - K\nA copy of the Company's 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange Commission, may be obtained by any stockholder without charge by written request to: Corporate Secretary Atrion Corporation One Allentown Parkway Allen, Texas 75002", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Discontinued Operations\nIn 2012, we closed our Video store operations, which offered DVD and video game rentals of equipment and sales in many of our corporateowned retail locations. The results of the Video business were treated as discontinued operations for accounting and reporting purposes. See 'Review of Consolidated Performance'.", - "page_start": 47, - "page_end": 47, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "DISCONTINUED OPERATIONS 3\nDuring 1997, the Company sold all of its natural gas operations. The consolidated financial statements presented herein reflect the Company's natural gas operations as discontinued operations for all periods presented. The consolidated financial statements reflect a gain on disposal of these discontinued operations of $165,000 in 2003 and 2002, and $5.5 million in 2001. These amounts are net of income tax expense of $85,000 in 2003 and 2002, and include an income tax benefit of $5.1 million in 2001.\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to $250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon revenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from the purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 gain also includes a $5.3 million non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. This reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "How much share of Atrion's revenues did its major customer representin in 2003 ? ", - "target_page": 21, - "target_passage": "The Company had one major customer which represented approximately $9.1 million (14.4 percent", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "2003 Revenues by Product Line\nOur financial performance earned recognition from Investors Business Daily , which ranked Atrion sixth on its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than doubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price has increased by 468 percent.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "REVENUES FROM MAJOR CUSTOMERS 9\nThe Company had one major customer which represented approximately $9.1 million (14.4 percent), $7.4 million (12.4 percent) and $11.0 million (19.1 percent) of the Company's operating revenues during the years 2003, 2002 and 2001, respectively.", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "4. Segment information continued\nCustomer A, Revenue.2013 $'000 = 226,759. Customer A, Revenue.2012 $'000 = 217,307. Customer A, % of External Revenue.2013 % = 69. Customer A, % of External Revenue.2012 % = 61. Customer B, Revenue.2013 $'000 = 102,523. Customer B, Revenue.2012 $'000 = 140,065. Customer B, % of External Revenue.2013 % = 31. Customer B, % of External Revenue.2012 % = 39", - "page_start": 79, - "page_end": 79, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "2003 compared to 2002\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 million of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of $0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%.\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS service revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the increase in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 subscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the churn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the after sales support. Competition in the wireless industry continues to have a significant impact on the results of the Company's PCS operation.\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party's network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the geographic size of the Company's network service area, the overall number of Sprint wireless customers, their travel patterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 per minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the Company agreed to maintain the travel rate at $0.058 per minute through December 31, 2006.\n45\n■\n2003 ANNUAL REPORT", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "RESULTS OF OPERATIONS\nThe Company's income from continuing operations was $4.9 million, or $2.86 per basic and $2.66 per diluted share, in 2003, compared to income from continuing operations of $4.1 million, or $2.37 per basic and $2.18 per diluted share, in 2002 and $4.3 million, or $2.10 per basic and $1.88 per diluted share, in 2001. Net income, including discontinued operations and cumulative effect of accounting change, totaled $5.1 million, or $2.96 per basic and $2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per basic and $4.30 per diluted share, in 2001. The Company adopted Statement of Financial Accounting Standards ('SFAS') No. 142 effective January 1, 2002. The required adoption of SFAS No. 142 as discussed in Note 2 to the Company's Consolidated Financial Statements included herein is considered a change in accounting principle and the cumulative effect of adopting this standard resulted in a $1.6 million, or $ .96 per basic and $ .88 per diluted share, noncash, after-tax charge in 2002.\nOperating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally attributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company's ophthalmic products, an 8 percent increase in the revenues of the Company's cardiovascular products, a 3 percent increase in the Company's fluid delivery products and a 2 percent increase in the Company's other medical and non-medical products and services. The 3 percent revenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company's cardiovascular products, a 4 percent increase in the Company's fluid delivery products and a 4 percent increase in the Company's other medical and non-medical products and services.", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its products throughout the United States and internationally. The Company's customers include hospitals, distributors, and other manufacturers. As of December 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. ('Atrion Medical Products'), Halkey-Roberts Corporation ('Halkey-Roberts') and Quest Medical, Inc. ('Quest Medical').", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "2002 compared to 2001\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million of wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 million or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%.\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS service revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which totaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end.\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party's network, was $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the Company's network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The rate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 through April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from October 1, 2001 through December 31, 2001.\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 million of rebates and discounts given at the time of sale, which became more pronounced during the year to meet industry competition for subscriber additions and subscriber retention.\nIn accordance with Sprint's requirements, the Company launched third generation (3G 1X) service in August 2002. The impact of 3G 1X-network enhancements on revenues was not significant in 2002.", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "We manage our assets and resources carefully.\nOur financial strategy centers on building the strength and stability that will position our company for ongoing growth. We approach the management of our resources with discipline and diligence, striking the balance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a strong financial foundation, and investing in the resources, technology and assets that will ensure operating efficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial results for 2003.\nFor the fifth consecutive year, Atrion's earnings per diluted share from continuing operations increased by more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of the economic pressures which have challenged virtually every business in recent years, we view five consecutive years of EPS growth-ranging from 16 percent to over 50 percent-as a sign of solid financial strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 per share, net income totaled $2.75 per diluted share for 2003.\nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return on equity (a) , which provides a good indication of how well we are utilizing investors' dollars, has steadily increased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the average return on equity for our industry, reported at 10.7 percent by statistical research sources.\nThe company's ability to generate strong cash flow continued to flourish in 2003. This is a key strength for our company, as it enables us to pursue a number of value-creating initiatives.\n· We initiated the payment of quarterly dividends on the company's common stock in September 2003. Recent changes in tax laws make this an efficient avenue for providing a return to our shareholders and, with continuing growth in earnings and cash flow, we plan to increase the dividend periodically.\n· We repurchased 193,814 shares of our common stock in 2003. Over the last five years, we have repurchased nearly two million shares of our stock, a strategy we regard as a wise investment for our company and our stockholders.\n· We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million at year-end 2003.\n2", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Geographic Information\nThe operations of the Group are located in only one geographic location, North America. All revenue is generated from sales to customers located in North America.\nRevenue from one major customer exceeded 10 percent of Group consolidated revenue for the year ended 31 December 2014 and accounted for 65 percent (2013: four major customers accounted for 47 percent, 15 percent, 10 percent and 10 percent) of our consolidated oil, natural gas and NGL revenues.\n- 93 -", - "page_start": 94, - "page_end": 94, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "LIQUIDITY AND CAPITAL RESOURCES\nDuring 2003, the Company expended $4.9 million for the purchase of the Company's common stock. Included in this amount was $4.1 million in April 2003 for the completion of a tender offer in which a total of 173,614 shares of common stock were repurchased at a price of $23.00 per share. During the fourth quarter of 2003, the Company repurchased the following shares of the Company's common stock:\nTotal Number of Shares Purchased, OCTOBER 2003 = 8,400. Total Number of Shares Purchased, NOVEMBER 2003 = 11,800. Total Number of Shares Purchased, TOTAL = 20,200. Average Price Paid Per Share, OCTOBER 2003 = $42.42. Average Price Paid Per Share, NOVEMBER 2003 = $41.02. Average Price Paid Per Share, TOTAL = $41.60. Total Number of Shares Purchased, OCTOBER 2003 = . Total Number of Shares Purchased, NOVEMBER 2003 = . Total Number of Shares Purchased, TOTAL = . As Part of Publicly Announced Plan or Program, OCTOBER 2003 = 8,400. As Part of Publicly Announced Plan or Program, NOVEMBER 2003 = 11,800. As Part of Publicly Announced Plan or Program, TOTAL = 20,200. Maximum Number of Shares That May Yet Be Purchased Under Plan or Program (a), OCTOBER 2003 = 105,800. Maximum Number of Shares That May Yet Be Purchased Under Plan or Program (a), NOVEMBER 2003 = 94,000. Maximum Number of Shares That May Yet Be Purchased Under Plan or Program (a), TOTAL = 94,000\n(a) This program was announced in April 2000 and initially provided for 200,000 shares to be repurchased.\nThe Company received net proceeds of $2.7 million for the exercise of employee stock options during 2003.\nIn September 2003, the Company announced that its Board of Directors had approved a policy for the payment of regular quarterly cash dividends on the Company's common stock. During 2003 the Company paid dividends totaling $406,000 to its stockholders.\nThe table below summarizes debt, lease and other minimum contractual obligations outstanding at December 31, 2003:", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "What was Atrion's gross profit in 2003 (in thousands) ? ", - "target_page": 10, - "target_passage": "Gross Profit 22,239", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "RESULTS OF OPERATIONS\nThe Company's cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of goods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an improvement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was primarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above.\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company's gross profit in 2003 was 35 percent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003\n24\nfrom the prior year was primarily due to the above-mentioned improvement in manufacturing variances. The decline in gross profit percentage in 2002 from the prior year was primarily due to the unfavorable shift in product mix.", - "page_start": 25, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Gross Profit\nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased markdowns at Nordstrom Rack.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Note 3. Securities and Investments\n2003, Cost.(in thousands) = . 2003, Gross Unrealized Holding Gains.(in thousands) = . 2003, Gross Unrealized Holding Losses.(in thousands) = . 2003, Fair Value.(in thousands) = . Deutsche Telekom, AG, Cost.(in thousands) = $ 85. Deutsche Telekom, AG, Gross Unrealized Holding Gains.(in thousands) = $ 64. Deutsche Telekom, AG, Gross Unrealized Holding Losses.(in thousands) = - $. Deutsche Telekom, AG, Fair Value.(in thousands) = $ 149. Other, Cost.(in thousands) = 73. Other, Gross Unrealized Holding Gains.(in thousands) = -. Other, Gross Unrealized Holding Losses.(in thousands) = 23. Other, Fair Value.(in thousands) = 50. , Cost.(in thousands) = $ 158. , Gross Unrealized Holding Gains.(in thousands) = $ 64. , Gross Unrealized Holding Losses.(in thousands) = 23 $. , Fair Value.(in thousands) = $ 199. 2002, Cost.(in thousands) = . 2002, Gross Unrealized Holding Gains.(in thousands) = . 2002, Gross Unrealized Holding Losses.(in thousands) = . 2002, Fair Value.(in thousands) = . Deutsche Telekom, AG, Cost.(in thousands) = $ 85. Deutsche Telekom, AG, Gross Unrealized Holding Gains.(in thousands) = $ 20. Deutsche Telekom, AG, Gross Unrealized Holding Losses.(in thousands) = - $. Deutsche Telekom, AG, Fair Value.(in thousands) = $ 105. Other, Cost.(in thousands) = 73. Other, Gross Unrealized Holding Gains.(in thousands) = -. Other, Gross Unrealized Holding Losses.(in thousands) = 27. Other, Fair Value.(in thousands) = 46. , Cost.(in thousands) = $ 158. , Gross Unrealized Holding Gains.(in thousands) = $ 20. , Gross Unrealized Holding Losses.(in thousands) = 27 $. , Fair Value.(in thousands) = $ 151. 2001, Cost.(in thousands) = . 2001, Gross Unrealized Holding Gains.(in thousands) = .", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Cost of Revenues and Gross Margin\nTable of Contents\nChange.$ = . Gross margin total automotive & services and other segment, Change.% = . Gross margin total automotive & services and other segment, Nine Months Ended September 30,.2024 = 17.6 %. Gross margin total automotive & services and other segment, Nine Months Ended September 30,.2023 = 18.5 %. Gross margin total automotive & services and other segment, Change.$ = . Gross margin total automotive & services and other segment, Change.% = . Gross profit energy generation and storage segment, Three Months Ended September 30,.2024 = $ 725. Gross profit energy generation and storage segment, Three Months Ended September 30,.2023 = $ 381. Gross profit energy generation and storage segment, Change.$ = . Gross profit energy generation and storage segment, Change.% = . Gross profit energy generation and storage segment, Nine Months Ended September 30,.2024 = $ 1,868. Gross profit energy generation and storage segment, Nine Months Ended September 30,.2023 = $ 827. Gross profit energy generation and storage segment, Change.$ = . Gross profit energy generation and storage segment, Change.% = . Gross margin energy generation and storage segment, Three Months Ended September 30,.2024 = 30.5 %. Gross margin energy generation and storage segment, Three Months Ended September 30,.2023 = 24.4 %. Gross margin energy generation and storage segment, Change.$ = . Gross margin energy generation and storage segment, Change.% = . Gross margin energy generation and storage segment, Nine Months Ended September 30,.2024 = 26.6 %. Gross margin energy generation and storage segment, Nine Months Ended September 30,.2023 = 18.0 %. Gross margin energy generation and storage segment, Change.$ = . Gross margin energy generation and storage segment, Change.% = . Total gross profit, Three Months Ended September 30,.2024 = $ 4,997. Total gross profit, Three Months Ended September 30,.2023 = $ 4,178. Total gross profit, Change.$ = . Total gross profit, Change.% = . Total gross profit, Nine Months Ended September 30,.2024 = $ 13,271. Total gross profit, Nine Months Ended September 30,.2023 = $ 13,222. Total gross profit, Change.$ = . Total gross profit, Change.% = . Total gross margin, Three", - "page_start": 37, - "page_end": 37, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its products throughout the United States and internationally. The Company's customers include hospitals, distributors, and other manufacturers. As of December 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. ('Atrion Medical Products'), Halkey-Roberts Corporation ('Halkey-Roberts') and Quest Medical, Inc. ('Quest Medical').", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "GROSS PROFIT\nGross profit as a percent of net sales improved 1.0 percentage point in 2003 as compared to fiscal 2002 and 1.3 percentage points in 2002 as compared to 2001. The improvement in both periods was a result of the continued net benefits of rapid continuous improvement, restructuring initiatives, business simplification, new products, and improved price realization. Included in 2003 gross profit was $6.7 million of accelerated depreciation, which reduced gross profits 0.4 percentage points. The Company expects to mitigate any future increases in material costs through various initiatives, including alternative materials and suppliers and its rapid continuous improvement program.", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Cost of Revenues and Gross Margin\nTable of Contents\n30,.2023 = $ 58,384. Total cost of revenues, Change.$ = $ 328. Total cost of revenues, Change.% = 1 %. Gross profit total automotive, Three Months Ended September 30,.2024 = $ 4,026. Gross profit total automotive, Three Months Ended September 30,.2023 = $ 3,668. Gross profit total automotive, Change.$ = . Gross profit total automotive, Change.% = $. Gross profit total automotive, Nine Months Ended September 30,.2024 = 10,909. Gross profit total automotive, Nine Months Ended September 30,.2023 = $ 11,965. Gross profit total automotive, Change.$ = . Gross profit total automotive, Change.% = . Gross margin total automotive, Three Months Ended September 30,.2024 = 20.1 %. Gross margin total automotive, Three Months Ended September 30,.2023 = 18.7 %. Gross margin total automotive, Change.$ = . Gross margin total automotive, Change.% = . Gross margin total automotive, Nine Months Ended September 30,.2024 = 19.0 %. Gross margin total automotive, Nine Months Ended September 30,.2023 = 19.7 %. Gross margin total automotive, Change.$ = . Gross margin total automotive, Change.% = . Gross profit total automotive & services and other segment, Three Months Ended September 30,.2024 = $ 4,272. Gross profit total automotive & services and other segment, Three Months Ended September 30,.2023 = $ 3,797. Gross profit total automotive & services and other segment, Change.$ = . Gross profit total automotive & services and other segment, Change.% = . Gross profit total automotive & services and other segment, Nine Months Ended September 30,.2024 = $ 11,403. Gross profit total automotive & services and other segment, Nine Months Ended September 30,.2023 = $ 12,395. Gross profit total automotive & services and other segment, Change.$ = . Gross profit total automotive & services and other segment, Change.% = . Gross margin total automotive & services and other segment, Three Months Ended September 30,.2024 = 18.7 %. Gross margin total automotive & services and other segment, Three Months Ended September 30,.2023 = 17.4 %. Gross margin total automotive & services and other segment,", - "page_start": 37, - "page_end": 37, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "RESULTS OF OPERATIONS\nThe Company believes that 2004 revenues will be higher than 2003 revenues and that the cost of goods sold, gross profit, operating income and income from continuing operations will each be higher in 2004 than in 2003. The Company further believes that it will have continuing volume growth in most of its product lines in 2004, complemented by the introduction of new products, and that it will achieve a double-digit annual rate of growth in earnings per share from continuing operations for the next several years.", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nGross.Unrealized Holding Losses = (835,320). Obligations of state and political subdivisions, December 31, 2001 Gross.Estimated Fair Value = 82,851,081. Corporate bonds, December 31, 2001 Gross.Amortized Cost Basis = 56,553,112. Corporate bonds, December 31, 2001 Gross.Gross Unrealized Holding Gains = 2,000,708. Corporate bonds, December 31, 2001 Gross.Unrealized Holding Losses = (31,141). Corporate bonds, December 31, 2001 Gross.Estimated Fair Value = 58,522,679. Mortgage-backed securities, December 31, 2001 Gross.Amortized Cost Basis = 189,421,296. Mortgage-backed securities, December 31, 2001 Gross.Gross Unrealized Holding Gains = 2,982,733. Mortgage-backed securities, December 31, 2001 Gross.Unrealized Holding Losses = (684,161). Mortgage-backed securities, December 31, 2001 Gross.Estimated Fair Value = 191,719,868. Total debt securities available-for-sale, December 31, 2001 Gross.Amortized Cost Basis = 421,670,844. Total debt securities available-for-sale, December 31, 2001 Gross.Gross Unrealized Holding Gains = 8,149,445. Total debt securities available-for-sale, December 31, 2001 Gross.Unrealized Holding Losses = (1,807,785). Total debt securities available-for-sale, December 31, 2001 Gross.Estimated Fair Value = 428,012,504. Other securities, December 31, 2001 Gross.Amortized Cost Basis = 3,006,701. Other securities, December 31, 2001 Gross.Gross Unrealized Holding Gains = -. Other securities, December 31, 2001 Gross.Unrealized Holding Losses = -. Other securities, December 31, 2001 Gross.Estimated Fair Value = 3,006,701. Total securities available-for-sale, December 31, 2001 Gross.Amortized Cost Basis = $424,677,545. Total securities available-for-sale, December 31, 2001 Gross.Gross Unrealized Holding Gains = $8,149,445. Total securities available-for-sale, December 31, 2001", - "page_start": 77, - "page_end": 77, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "C o r p o r a t e O f f i c e :\nAtrion Corporation One Allentown Parkway Allen, Texas 75002 (972) 390-9800\nwww.atrioncorp.com", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What the name of the first bridge buildt over Danube ?", - "target_page": 16, - "target_passage": "he Chain Bridge was the first bridge over the Danube", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "CHAIN BRIDGE, Budapest\nThe Chain Bridge, built from 1839 to 1849, was the first bridge over the Danube, linking the cities Buda and Pest. Measuring 380 meters long and 15.7 meters wide, it is supported by pillars shaped like antique triumphal arches.", - "page_start": 15, - "page_end": 15, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "CHARLES BRIDGE, Prague\nDating back to the 14th century, the Charles Bridge is one of the jewels of Gothic architecture. This stone bridge, built by Charles IV, the Czech King and Holy Roman Emperor, created a reliable connection between the Lesser and the Old Town and gave way to the merging of life of both banks.\n2 3\n2 4", - "page_start": 24, - "page_end": 25, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "B R O O K LYN BRIDGE, New Yo r k\nThe Brooklyn Bridge, proudly standing over the East River and connecting the boroughs of Brooklyn and Manhattan, endures as one of the most famous bridges in America. When completed in May 1883, the 5989-foot-long Brooklyn Bridge was the largest suspension bridge in the world.\n2 7\n2 8", - "page_start": 28, - "page_end": 29, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "RIVER TYNE BRIDGES, Newcastle\nSix bridges dominate the Tyne between Newcastle and Gateshead, enabling innovative railway and roadway advances over the past two centuries. At the time of its completion in 1929, the Tyne Bridge was the world's longest single span bridge.", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "77. Establishm ent and com position of N tlo ya D ikgosi\n(1) There shall be a N tlo ya D ikgosi for B otsw ana w hich shall consist of not less than 33 nor m ore than 35 M em bers w hich shall be constituted as follow s GLYPH<151>\n( a ) one person from each of the follow ing areas, w hich person for the tim e being perform s the functions of the office of Kgosi in respect of such areas-\n(i) Barolong Farm s in the S outhern D istrict,\n(ii) C hobe in the N orth W est D istrict,\n(iii) G a M alete in the S outh E ast D istrict,\n(iv) G a M m angw ato in the C entral D istrict,\n(v) G hanzi D istrict,\n(vi) G oo Taw ana in the N orth W est D istrict,\n(vii) Kgalagadi D istrict,\n(viii) Kgatleng D istrict,\n(ix) Kw eneng D istrict,\n(x) N gw aketse in the S outhern D istrict,\n(xi) N orth E ast D istrict, and\n(xii) Tlokw eng in the S outh E ast D istrict;\n( b ) five persons w ho shall be appointed by the P resident; and\n( c ) such num ber of persons, not being m ore than 20, as m ay be selected under section 78(4)( c ) of this C onstitution.\n(2) N otw ithstanding the provisions of subsection (1)( a ), the num ber of persons referred to in that subsection m ay, by virtue of section 78 (5), be less than 12, but not less than 10.", - "page_start": 34, - "page_end": 34, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 12: Performance of each model for Bitext Mining, Semantic Textual Similarity (STS) and Summarization.\n= 1.00. embed-multilingual-v3.0, DiaBla_fr -en = 0.83. embed-multilingual-v3.0, STSBenchmarkMultilingual = 0.82. embed-multilingual-v3.0, STS22 STS = 0.83. embed-multilingual-v3.0, SICKFr = 0.79. embed-multilingual-v3.0, SummEv alFr Summarization = 0.31. flaubert_base_cased, Flor es_fr -en = 0.31. flaubert_base_cased, Flor es_en-fr BitextMining = 0.36. flaubert_base_cased, DiaBla_fr -en = 0.02. flaubert_base_cased, STSBenchmarkMultilingual = 0.37. flaubert_base_cased, STS22 STS = 0.65. flaubert_base_cased, SICKFr = 0.54. flaubert_base_cased, SummEv alFr Summarization = 0.31. flaubert_base_uncased flaubert_large_cased, Flor es_fr -en = 0.25. flaubert_base_uncased flaubert_large_cased, Flor es_en-fr BitextMining = 0.08 0.17. flaubert_base_uncased flaubert_large_cased, DiaBla_fr -en = 0.03 0.01. flaubert_base_uncased flaubert_large_cased, STSBenchmarkMultilingual = 0.33 0.16. flaubert_base_uncased flaubert_large_cased, STS22 STS = 0.55 0.49. flaubert_base_uncased flaubert_large_cased, SICKFr = 0.42 0.35. flaubert_base_uncased flaubert_large_cased, SummEv alFr Summarization = 0.29.", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv4.pdf" - }, - { - "text": "References\n155. Marie de Médicis (https://www.britannica.com/EBchecked/topic/365073) at the Encyclopædia Britannica\n156. Wurzbach, Constantin von, ed. (1861). \"Habsburg, Philipp III.\" (https://en.wikisource.org/wiki/de:BLK%C3%96:Ha bsburg,_Philipp_III.). Biographisches Lexikon des Kaiserthums Oesterreich [ Biographical Encyclopedia of the Austrian Empire ] (in German). Vol. 7. p. 120 - via Wikisource.\n157. Wurzbach, Constantin von, ed. (1861). \"Habsburg, Margaretha (Königin von Spanien)\" (https://en.wikisource.org/ wiki/de:BLK%C3%96:Habsburg,_Margaretha_(K%C3%B6nigin_von_Spanien)). Biographisches Lexikon des Kaiserthums Oesterreich [ Biographical Encyclopedia of the Austrian Empire ] (in German). Vol. 7. p. 13 - via Wikisource.\n158. Marek, Miroslav. \"Capet 40\" (http://genealogy.euweb.cz/capet/capet40.html). euweb.cz . Archived (https://web.archi ve.org/web/20131014145729/http://www.genealogy.euweb.cz/capet/capet40.html) from the original on 14 October 2013. Retrieved 13 February 2009.\n159. \"Suzanne de Mésenge\" (http://roglo.eu/roglo?lang=es;i=337437). roglo.eu . Archived (https://web.archive.org/web/ 20160411124656/http://roglo.eu/roglo?lang=es;i=337437) from the original on 11 April 2016. Retrieved 14 September 2009.", - "page_start": 29, - "page_end": 30, - "source_file": "wikipedia5.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 7: Models included in the benchmark with their main characteristics. The size in Gb is estimated using the number of parameters counted as float32 numbers. Sentence sim refers to the fact that the model was trained on a task that favors semantic similarity.\nflaubert-base-uncased, Language = french. flaubert-base-uncased, # params = 1,37e+08. flaubert-base-uncased, Size (Gb) = 0.55. flaubert-base-uncased, Seq. Len. = 512. flaubert-base-uncased, Emb. dim. = . flaubert-base-uncased, License = MIT. flaubert-base-uncased, Sentence sim = No. flaubert-large-cased, Finetuned = No. flaubert-large-cased, Language = french. flaubert-large-cased, # params = 3,73e+08. flaubert-large-cased, Size (Gb) = 1.49. flaubert-large-cased, Seq. Len. = 512. flaubert-large-cased, Emb. dim. = 768 1024. flaubert-large-cased, License = MIT. flaubert-large-cased, Sentence sim = No. distilbert-base-25lang-cased, Finetuned = No. distilbert-base-25lang-cased, Language = multilingual. distilbert-base-25lang-cased, # params = 1,08e+08. distilbert-base-25lang-cased, Size (Gb) = 0.43. distilbert-base-25lang-cased, Seq. Len. = 512. distilbert-base-25lang-cased, Emb. dim. = 768. distilbert-base-25lang-cased, License = Apache-2.0. distilbert-base-25lang-cased, Sentence sim = No. distilbert-base-en-fr-cased, Finetuned = No. distilbert-base-en-fr-cased, Language = bilingual. distilbert-base-en-fr-cased, # params =", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv4.pdf" - }, - { - "text": "European Headquarters\nEuronet Worldwide\nHorvát u. 14-24.\n1027 Budapest, Hungary\nTel: 36-1-224-1000\nFax: 36-1-224-1013\n© 2001 Euronet Worldwide 021 03/01 All trademarks are property of their respective owners.\nwww.euronetworldwide.com", - "page_start": 47, - "page_end": 47, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "( 1 ) O r g a n i z a t i o n\n- EFT Services Holding B.V., incorporated in the Netherlands\n- Euronet Banktechnikai Szolgaltato Kft. ('Bank Tech'), incorporated in Hungary\n- Euronet Adminisztracios Szolgaltato Kft. ('Administrative Services') (formerly SatComNet), incorporated in Hungary\n- Bankomat 24/Euronet Sp. z o.o. ('Bankomat'), incorporated in Poland\n- EFT-Usluge d o.o., incorporated in Croatia\n- Euronet Services GmbH, incorporated in Germany\n- EFT Services France SAS, incorporated in France\n- Euronet Services spol. s.r.o., incorporated in the Czech Republic\n- Euronet Services SRL, incorporated in Romania\n- Euronet Services (UK) Limited, incorporated in the United Kingdom\n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) ('Euronet USA') incorporated in Arkansas, United States of America\n- EFT Network Services LLC ('Dash'), incorporated in Arkansas, United States of America\n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation)\n- Euronet Eft Services Hellas, incorporated in Greece", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What was the total amount of operating expenses of 2000 by Network Wordwide in 2000 ?", - "target_page": 17, - "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Investments\n2000.Amount = $ 40,669. Total investments, 2000.Percent = ", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Consolidated Balance Sheets\n(amortized cost of $39,154 and $33,856), 2000 = $ 34,492. Equity securities, available for sale, at fair value (cost of $1,289 and $921), 2001 = 1,349. Equity securities, available for sale, at fair value (cost of $1,289 and $921), 2000 = 1,056. Policy loans, at outstanding balance, 2001 = 3,317. Policy loans, at outstanding balance, 2000 = 3,610. Other investments, 2001 = 1,977. Other investments, 2000 = 1,511. Total investments, 2001 = 46,689. Total investments, 2000 = 40,669. Cash, 2001 = 353. Cash, 2000 = 227. Premiums receivable and agents' balances, 2001 = 2,432. Premiums receivable and agents' balances, 2000 = 2,295. Reinsurance recoverables, 2001 = 5,162. Reinsurance recoverables, 2000 = 4,579. Deferred policy acquisition costs and present value of future profits, 2001 = 6,420. Deferred policy acquisition costs and present value of future profits, 2000 = 5,305. Deferred income tax, 2001 = 693. Deferred income tax, 2000 = 682. Goodwill, 2001 = 1,694. Goodwill, 2000 = 1,202. Other assets, 2001 = 3,075. Other assets, 2000 = 2,519. Separate account assets, 2001 = 114,720. Separate account assets, 2000 = 114,054. Total assets, 2001 = $ 181,238. Total assets, 2000 = $ 171,532. Liabilities, 2001 = . Liabilities, 2000 = . Future policy benefits, unpaid claims and claim adjustment expenses Property & Casualty, 2001 = $ 16,678. Future policy benefits, unpaid claims and claim adjustment expenses Property & Casualty, 2000 = $ 15,874. Life, 2001 = 8,819. Life, 2000 = 7,105. Other policyholder funds and benefits payable, 2001 = 19,355. Other policyholder funds and benefits payable, 2000 = 15,848. Unearned premiums, 2001 = 3,436. Unearned premiums, 2000 = 3,093. Short-term debt, 2001 = 599. Short-term debt, 2000", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\nConsolidated\n2000\n1999\n2000\n1999\n$\n$\n$\n$\n548,242\n602,177", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Consolidated Statements of Income\nFor the years ended December 31,\nRevenues, 2001 = . Revenues, 2000 = . Revenues, 1999 = . Earned premiums, 2001 = $ 9,409. Earned premiums, 2000 = $ 8,941. Earned premiums, 1999 = $ 8,342. Fee income, 2001 = 2,633. Fee income, 2000 = 2,484. Fee income, 1999 = 2,105. Net investment income, 2001 = 2,850. Net investment income, 2000 = 2,674. Net investment income, 1999 = 2,627. Other revenue, 2001 = 491. Other revenue, 2000 = 459. Other revenue, 1999 = 420. Net realized capital gains (losses), 2001 = (236). Net realized capital gains (losses), 2000 = 145. Net realized capital gains (losses), 1999 = 34. Total revenues, 2001 = 15,147. Total revenues, 2000 = 14,703. Total revenues, 1999 = 13,528. Benefits, claims and expenses, 2001 = . Benefits, claims and expenses, 2000 = . Benefits, claims and expenses, 1999 = . Benefits, claims and claim adjustment expenses, 2001 = 9,764. Benefits, claims and claim adjustment expenses, 2000 = 8,419. Benefits, claims and claim adjustment expenses, 1999 = 7,902. Amortization of deferred policy acquisition costs and present value of future profits, 2001 = 2,214. Amortization of deferred policy acquisition costs and present value of future profits, 2000 = 2,213. Amortization of deferred policy acquisition costs and", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Year 2000 Compliance\nThe Company's European and U.S. Year 2000 compliance teams re p o rted no material Year 2000 problems during the advent of the year 2000, either with Euro n e t 's own systems or the systems of its customers. The Company is unaware of any material Year 2000 complications to date.", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\nitems of revenue and expense:, Company.1999. = . Operating Revenue, Consolidated 1999.2000.$ = . Operating Revenue, Consolidated 1999..$ = . Operating Revenue, Company.2000. = . Operating Revenue, Company.1999. = . Rendering of services, Consolidated 1999.2000.$ = 14,522,968. Rendering of services, Consolidated 1999..$ = 26,051,736. Rendering of services, Company.2000. = -. Rendering of services, Company.1999. = -. Dividend received from, Consolidated 1999.2000.$ = . Dividend received from, Consolidated 1999..$ = . Dividend received from, Company.2000. = . Dividend received from, Company.1999. = . controlled entity, Consolidated 1999.2000.$ = -. controlled entity, Consolidated 1999..$ = -. controlled entity, Company.2000. = -. controlled entity, Company.1999. = 1,100,000. Rent, Consolidated 1999.2000.$ = 390,966. Rent, Consolidated 1999..$ = 287,737. Rent, Company.2000. = -. Rent, Company.1999. = -. Interest - other persons, Consolidated 1999.2000.$ = 210,840. Interest - other persons, Consolidated 1999..$ = 44,551. Interest - other persons, Company.2000. = 185,959. Interest - other persons, Company.1999. = 21,319. , Consolidated 1999.2000.$ = . , Consolidated 1999..$ = . , Company.2000. = . , Company.1999. = -. Interest - related parties, Consolidated 1999.2000.$ = -. Interest - related parties, Consolidated 1999..$ = 23,861. Interest - related parties, Company.2000. = -. Interest - related parties, Company.1999. = . Non Operating Revenue, Consolidated 1999.2000.$ = . Non Operating Revenue, Consolidated 1999..$ = . Non Operating Revenue, Company.2000. = . Non Operating Revenue, Company.1999. = . Proceeds from sale of assets:, Consolidated 1999.2000.$ = . Proceeds from sale of assets:, Consolidated 1999..$ = . Proceeds from sale of assets:, Company.2000. = . Proceeds from sale of assets:, Company.1999. = . Property,", - "page_start": 45, - "page_end": 45, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Comparison of Operation Results for the Years Ended December 31, 2000 and 1999\nThe Company re c o rded an $800,000 write-down of certain ATM hard w a re assets associated with the p u rchase of the Budapest Bank ATM network in May 2000 and the Service Bank ATM network in M a rch 1999 (see Note 10 to the Consolidated Financial Statements - Asset Write Down). In addition, the Company re c o rded a one-time gain in its Central European Sub-segment of $1.2 million. The gain is related to a change in Hungarian law that eliminates a major portion of the Company's liability for import taxes on ATM hard w a re to the Hungarian government. The gain is included as an element of direct operating costs.\nThe operating expenses for the Central European Sub-segment totaled $21.7 million for the year ended December 31, 2000 as compared to $20.7 million for the year ended December 31, 1999, an i n c rease of 5%. The increase in operating expenses is largely the result of an increase in the number of ATMs operated by the Company from 1,203 at December 31, 1999 to 1,391 at December 31, 2000, and increased transaction volumes.\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year ended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating expenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at December 31, 2000, and increased transaction volumes.\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to $2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition of the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities.", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n- hire purchase, Company.1999. = -. Write off of goodwill, Consolidated 1999.2000.$ = -. Write off of goodwill, Consolidated 1999..$ = 95,105. Write off of goodwill, Company.2000. = -. Write off of goodwill, Company.1999. = -. Write off of shares - other corporations, Consolidated 1999.2000.$ = -. Write off of shares - other corporations, Consolidated 1999..$ = 2,647. Write off of shares - other corporations, Company.2000. = -. Write off of shares - other corporations, Company.1999. = -. Bad debts, Consolidated 1999.2000.$ = 13,136. Bad debts, Consolidated 1999..$ = 29,064. Bad debts, Company.2000. = -. Bad debts, Company.1999. = -. Borrowing costs expensed:, Consolidated 1999.2000.$ = . Borrowing costs expensed:, Consolidated 1999..$ = . Borrowing costs expensed:, Company.2000. = . Borrowing costs expensed:, Company.1999. = . Interest expense - other persons, Consolidated 1999.2000.$ = 574,479. Interest expense - other persons, Consolidated 1999..$ = 743,437. Interest expense - other persons, Company.2000. = -. Interest expense - other persons, Company.1999. = -. Finance charges - hire purchase, Consolidated 1999.2000.$ = 514,889. Finance charges - hire purchase, Consolidated 1999..$ = 261,409. Finance charges - hire purchase, Company.2000. = -. Finance charges - hire purchase, Company.1999. = -. Rental - operating leases, Consolidated 1999.2000.$ = 88,447. Rental - operating leases, Consolidated 1999..$ = 72,384. Rental - operating leases, Company.2000. = -. Rental - operating leases, Company.1999. = -. Employee Entitlements, Consolidated 1999.2000.$ = 1,630,357. Employee Entitlements, Consolidated 1999..$ = 3,515,875. Employee Entitlements, Company.2000. = -. Employee Entitlements, Company.1999. = -. ABNORMAL ITEMS, Consolidated 1999.2000.$ = . ABNORMAL ITEMS, Consolidated 1999..$ =", - "page_start": 45, - "page_end": 45, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\nmaturity dates through to 2001 and which may be extended by mutual agreement: · Amount used, Consolidated.2000.$ = 6,500,000. Secured loan facilities with various maturity dates through to 2001 and which may be extended by mutual agreement: · Amount used, Consolidated.1999.$ = 6,500,000. Secured loan facilities with various maturity dates through to 2001 and which may be extended by mutual agreement: · Amount used, Company.2000.$ = -. Secured loan facilities with various maturity dates through to 2001 and which may be extended by mutual agreement: · Amount used, Company.1999.$ = -. · Amount unused, Consolidated.2000.$ = -. · Amount unused, Consolidated.1999.$ = -. · Amount unused, Company.2000.$ = -. · Amount unused, Company.1999.$ = -. , Consolidated.2000.$ = 6,500,000. , Consolidated.1999.$ = 6,500,000. , Company.2000.$ = -. , Company.1999.$ = -. EXPENDITURE COMMITMENTS, Consolidated.2000.$ = . EXPENDITURE COMMITMENTS, Consolidated.1999.$ = . EXPENDITURE COMMITMENTS, Company.2000.$ = . EXPENDITURE COMMITMENTS, Company.1999.$ = . Hire Purchase Contracts, Consolidated.2000.$ = . Hire Purchase Contracts, Consolidated.1999.$ = . Hire Purchase Contracts, Company.2000.$ = . Hire Purchase Contracts, Company.1999.$ = . Not later than 1 year, Consolidated.2000.$ = 1,676,437. Not later than 1 year, Consolidated.1999.$ = 1,243,290. Not later than 1 year, Company.2000.$ = -. Not later than 1 year, Company.1999.$ = -. Later than 1 year but not later than 2 years, Consolidated.2000.$ = 1,421,664. Later than 1 year but not later than 2 years, Consolidated.1999.$ = 1,057,181. Later than 1 year but not later than 2 years, Company.2000.$ = -. Later than 1 year but not", - "page_start": 53, - "page_end": 53, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Comparison of Results of Operations for the Years Ended December 31, 2000, 1999 and 1998\nRevenues The Company's total revenues increased to $52.7 million for the year ended December 31, 2000 from $41.5 million for the year ended December 31, 1999 and $11.9 million for the year ended December 31, 1998. The increase in revenues from 1999 to 2000 is primarily due to two factors: (1) a $10.4 million increase in Network Services Segment revenues resulting from the i n c rease in transaction volumes in the Company owned ATMs and an increase in the number of AT M s operated by the Company during this period; and (2) an increase of $800,000 in Software Solutions Segment revenues. The increase in revenues from 1998 to 1999 is primarily due to two factors: (1) a $15.0 million increase in Network Services Segment revenues resulting from the increase in transaction volume attributable to an increase in the number of ATMs operated by the Company during this period; and (2) the addition of $14.6 million of Software Solutions Segment re v e n u e s . Revenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of Operations sections below.\nOperating Expenses Total operating expenses increased to $88.1 million for the year ended December 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5 million for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down\nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network operations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in personnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The i n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs, (2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment operating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of Operations sections below.", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What was the share of revenues of Netwrok Wordwide made in Poland and Hungary in 2000 ?", - "target_page": 24, - "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Per Share Data\nFor the year ended December 31, 2002:, Net Earnings = . For the year ended December 31, 2002:, Weighted Average Shares = . For the year ended December 31, 2002:, Per Share Amount = . Net earnings per share, basic, Net Earnings = $33,952,550. Net earnings per share, basic, Weighted Average Shares = 12,359,966. Net earnings per share, basic, Per Share Amount = $ 2.75. Effect of stock options, Net Earnings = -. Effect of stock options, Weighted Average Shares = 47,523. Effect of stock options, Per Share Amount = . Net earnings per share, assuming dilution, Net Earnings = $33,952,550. Net earnings per share, assuming dilution, Weighted Average Shares = 12,409,489. Net earnings per share, assuming dilution, Per Share Amount = $ 2.74. For the year ended December 31, 2001:, Net Earnings = . For the year ended December 31, 2001:, Weighted Average Shares = . For the year ended December 31, 2001:, Per Share Amount = . Net earnings per share, basic, Net Earnings = $29,354,505. Net earnings per share, basic, Weighted Average Shares = 12,318,346. Net earnings per share, basic, Per Share Amount = $ 2.38. Effect of stock options, Net Earnings = -. Effect of stock options, Weighted Average Shares = 45,323. Effect of stock options, Per Share Amount = . Net earnings per share, assuming dilution, Net Earnings = $29,354,505. Net earnings per share, assuming dilution, Weighted Average Shares = 12,363,669. Net earnings per share, assuming dilution, Per Share Amount = $ 2.37. For the year ended December 31, 2000:, Net Earnings = . For the year ended December 31, 2000:, Weighted Average Shares = . For the year ended December 31, 2000:, Per Share Amount = . Net earnings per share, basic, Net Earnings = $28,316,047. Net earnings per share, basic, Weighted Average Shares = 12,426,344. Net earnings per share, basic, Per Share Amount = $ 2.28. Effect of stock options, Net Earnings = -. Effect of stock options, Weighted Average Shares = 28,355. Effect of stock options, Per Share", - "page_start": 75, - "page_end": 75, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Foreign Exchange Exposure\nIn 2000, 30% of the Company's revenues were generated in Poland and Hungary, as compared to 27% in 1999 and 73% in 1998. The 2000 f i g u re has increased due to the increase in revenues for the Polish operations. In Hungary the majority of revenues received are denominated in Hungarian Forint and in Poland, the majority of revenues are denominated in Polish Zloty. However the majority of these foreign curre n c y denominated contracts are linked either to inflation or the retail price index. While it remains the case that a significant portion of the Company's e x p e n d i t u res are made in or are denominated in U.S. Dollars the Company is also striving to achieve more of its expenses in local currencies to match its revenues.\nThe Company estimates that a further 10% depreciation in foreign exchange rates of the Deutsche Mark, Hungarian Forint, Polish Zloty and the British Pound Sterling against the U.S. dollar, would have the combined effect of a $7.1 million decrease in the re p o rted net loss. This was estimated using 10% of the Company's net losses after adjusting for unusual impairment and other items including U.S. dollar denominated or indexed expenses. The Company believes that this quantitative measure has inherent limitations. It does not take into account any govern m e n t a l actions or changes in either customer purchasing patterns or the Company's financing or operating strategies.\nAs a result of continued European economic convergence, including the increased influence of the Deutsche Mark, as opposed to the U.S. Dollar, on the Central European currencies, the Company expects that the currencies of the markets where it invests will fluctuate less against the Deutsche Mark than against the Dollar. Accord i n g l y, the Company believes that its Deutsche Mark denominated debt provides, in the medium to long term, for a closer matching of assets and liabilities than would Dollar denominated debt.", - "page_start": 23, - "page_end": 23, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "(18) Stock Plans\nAs the Network Services Segment continued to grow throughout 1999, the Company's management began to divide the internal org a n i z a t i o n of the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e Sub-segments: 'Central European Sub-segment' (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), 'We s t e rn E u ropean Sub-segment' (including Germ a n y, France, and the United Kingdom) and 'Other Operations Sub-segment' (including the United States and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l re p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1, 2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of the Company's wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian operations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative S e rvices. Those assets are now shown under the Other Operations Sub-segment.\nThe following tables present the segment results of the Company's operations for the years ended December 31, 2000, 1999 and 1998.", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "IN THOUSANDS EXCEPT PER SHARE DATA\n2002, Total Assets (1) = $1,993,183. 2002, Shareholders' Equity (1) = $238,768. 2002, Net Income (1) = $33,953. 2002, Basic Earnings per Share (2) = $2.75. 2002, Cash Dividends per Share (2) = $1.35. 2002, Stock Dividends and Splits = -. 2002, Year-End Book Value per Share (2) = $19.31. 2002, Year-End Market Value per Share (2) = $38.00. 2001, Total Assets (1) = 1,929,694. 2001, Shareholders' Equity (1) = 213,654. 2001, Net Income (1) = 29,355. 2001, Basic Earnings per Share (2) = 2.38. 2001, Cash Dividends per Share (2) = 1.16. 2001, Stock Dividends and Splits = 5/4 split. 2001, Year-End Book Value per Share (2) = 17.32. 2001, Year-End Market Value per Share (2) = 30.10. 2000, Total Assets (1) = 1,753,814. 2000, Shareholders' Equity (1) = 196,121. 2000, Net Income (1) = 28,316. 2000, Basic Earnings per Share (2) = 2.28. 2000, Cash Dividends per Share (2) = 1.03. 2000, Stock Dividends and Splits = -. 2000, Year-End Book Value per Share (2) = 15.92. 2000, Year-End Market Value per Share (2) = 25.15. 1999, Total Assets (1) = 1,723,369. 1999, Shareholders' Equity (1) = 178,663. 1999, Net Income (1) = 25,690. 1999, Basic Earnings per Share (2) = 2.06. 1999, Cash Dividends per Share (2) = 0.90. 1999, Stock Dividends and Splits = -. 1999, Year-End Book Value per Share (2) = 14.33. 1999, Year-End Market Value per Share (2) = 24.60. 1998, Total Assets (1) = 1,686,647. 1998, Shareholders' Equity (1) = 169,449. 1998, Net Income (1)", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Results of Operations\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS No. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill resulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years ended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company's goodwill, follows:\nReported net earnings, 2001 = $ 29,354,505. Reported net earnings, 2000 = $ 28,316,047. Add back: goodwill amortization, 2001 = . Add back: goodwill amortization, 2000 = . Goodwill amortization, before income tax, 2001 = 1,641,367. Goodwill amortization, before income tax, 2000 = 1,641,367. Income tax benefit, 2001 = (420,000). Income tax benefit, 2000 = (420,000). Adjusted net earnings, 2001 = $ 30,575,872. Adjusted net earnings, 2000 = $ 29,537,414. Basic earnings per share:, 2001 = . Basic earnings per share:, 2000 = . Reported net earnings, 2001 = $ 2.38. Reported net earnings, 2000 = $ 2.28. Goodwill amortization, net of income tax benefit, 2001 = .10. Goodwill amortization, net of income tax benefit, 2000 = .10. Adjusted net earnings, 2001 = $ 2.48. Adjusted net earnings, 2000 = $ 2.38. Earnings per share, assuming dilution:, 2001 = . Earnings per share, assuming dilution:, 2000 = . Reported net earnings, 2001 = $ 2.37. Reported net earnings, 2000 = $ 2.27. Goodwill amortization, net of income tax benefit, 2001 = .10. Goodwill amortization, net of income tax benefit, 2000 = .10. Adjusted net earnings, 2001 = $ 2.47. Adjusted net earnings, 2000 = $ 2.37", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS No. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill resulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years ended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company's goodwill, follows:\nReported net earnings, 2001 = $ 29,354,505. Reported net earnings, 2000 = $ 28,316,047. Add back: goodwill amortization, 2001 = . Add back: goodwill amortization, 2000 = . Goodwill amortization, before income tax, 2001 = 1,641,367. Goodwill amortization, before income tax, 2000 = 1,641,367. Income tax benefit, 2001 = (420,000). Income tax benefit, 2000 = (420,000). Adjusted net earnings, 2001 = $ 30,575,872. Adjusted net earnings, 2000 = $ 29,537,414. Basic earnings per share:, 2001 = . Basic earnings per share:, 2000 = . Reported net earnings, 2001 = $ 2.38. Reported net earnings, 2000 = $ 2.28. Goodwill amortization, net of income tax benefit, 2001 = .10. Goodwill amortization, net of income tax benefit, 2000 = .10. Adjusted net earnings, 2001 = $ 2.48. Adjusted net earnings, 2000 = $ 2.38. Earnings per share, assuming dilution:, 2001 = . Earnings per share, assuming dilution:, 2000 = . Reported net earnings, 2001 = $ 2.37. Reported net earnings, 2000 = $ 2.27. Goodwill amortization, net of income tax benefit, 2001 = .10. Goodwill amortization, net of income tax benefit, 2000 = .10. Adjusted net earnings, 2001 = $ 2.47. Adjusted net earnings, 2000 = $ 2.37\nGoodwill arising from acquisitions of assets and liabilities, rather than acquisitions of stock, amounting to $13,000,000, is deductible for federal income tax purposes.", - "page_start": 74, - "page_end": 74, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Net Income per Share of Common Stock Attributable to Common Stockholders\nThe following table presents the reconciliation of net income attributable to common stockholders to net income used in computing basic and diluted net income per share of common stock (in millions):\nTable of Contents", - "page_start": 15, - "page_end": 15, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "23. EARNINGS PER SHARE\nBasic earnings per share, 2000 Cents per Share = (0.62). Basic earnings per share, 1999 Cents per Share = 8.09. Diluted earnings per share, 2000 Cents per Share = (0.21). Diluted earnings per share, 1999 Cents per Share = 8.05. , 2000 Cents per Share = 2000. , 1999 Cents per Share = 1999. , 2000 Cents per Share = No.. , 1999 Cents per Share = No.. Weighted average number of ordinary shares on issue used in the calculation of basic earnings per share, 2000 Cents per Share = 43,000,000. Weighted average number of ordinary shares on issue used in the calculation of basic earnings per share, 1999 Cents per Share = 30,356,164\n53", - "page_start": 56, - "page_end": 56, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "(21) Reconciliation of Net Loss to Net Cash Used in Operating Activities\nThe reconciliation of net loss to net cash used in operating activities for the years ended December 31, 2000, 1999, and 1998 follows.", - "page_start": 44, - "page_end": 44, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "European Headquarters\nEuronet Worldwide\nHorvát u. 14-24.\n1027 Budapest, Hungary\nTel: 36-1-224-1000\nFax: 36-1-224-1013\n© 2001 Euronet Worldwide 021 03/01 All trademarks are property of their respective owners.\nwww.euronetworldwide.com", - "page_start": 47, - "page_end": 47, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "Under which name was the Applied company initially fouded ?", - "target_page": 6, - "target_passage": "The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Business\nApplied Industrial Technologies, Inc. and subsidiaries (the 'Company' or 'Applied') is a leading industrial distributor serving Maintenance Repair Operations (MRO) and Original Equipment Manufacturing (OEM) customers in virtually every industry. In addition, Applied provides engineering, design and systems integration for industrial and fluid power applications, as well as customized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory management solutions that provide added value to its customers. Although the Company does not generally manufacture the products it sells, it does assemble and repair certain products and systems.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\nThe Company has contingent liabilities, which have arisen in the course of its business, including pending litigation, preferential payment claims in customer bankruptcies, environmental remediation, taxes, and other claims. The Company currently has a claim for approximately $7.6 million pending against it, arising out of the bankruptcy of a customer filed in 2001. The Company was named a critical vendor by the bankruptcy court and, accordingly, was paid in full for all outstanding receivables. The claim alleges that the Company received preferential payments from the customer during the ninety days before the customer filed for bankruptcy protection. The claim was brought in February 2003. The Company has recorded an accrual with respect to this contingency, in an amount substantially less than the full amount of the claim, which represents the best estimate within the range of likely exposure, and intends to vigorously defend against the claim. Given the nature of this claim, it is possible that the ultimate outcome could differ from the recorded amount.", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\nclaims. The Company currently has a claim for approximately $7.6 million pending against it arising out of the bankruptcy of a customer filed in 2001. The Company was named a critical vendor by the bankruptcy court and, accordingly, was paid in full for all outstanding receivables. The claim alleges that the Company received preferential payments from the customer during the ninety days before the customer filed for bankruptcy protection. The claim was brought in February 2003. The Company has recorded an accrual with respect to this contingency, in an amount substantially less than the full amount of the claim, which represents the best estimate within the range of likely exposure and intends to vigorously defend against the claim. Given the nature of this claim, it is possible that the ultimate outcome could differ from the recorded amount. It is our opinion, after consultation with legal counsel, that additional liabilities, if any, resulting from these matters, are not expected to have a material adverse effect on our financial condition, although such matters could have a material effect on our quarterly or annual operating results and cash flows when resolved in a future period.", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "To Our Shareholders:\nFiscal 2012 was a successful year on multiple fronts for Applied Industrial Technologies. Our business performance resulted from sound operating discipline and a focus on operational excellence, including:", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "PEOPLE\nPURPOSE\nPRODUCT\nPERFORMANCE\nThis report contains statements that are forward-looking, as that term is defined by the Securities and Exchange Commission in its rules, regulations and releases. Applied intends that such forward-looking statements be subject to the safe harbors created thereby. All forwardlooking statements are based on current expectations regarding important risk factors, including those identified on page 12 of this report and in our Annual Report on Form 10-K for the fiscal year ended June 30, 2012. Accordingly, actual results may differ materially from those expressed in the forward-looking statements, and the making of such statements should not be regarded as a representation by Applied or any other person that results expressed therein will be achieved.\nPURPOSE PRODUCT PERFORMANCE PEOPLE\nApplied Industrial Technologies is a leading industrial distributor that offers more than four million parts to serve the needs of MRO and OEM customers in virtually every industry. In addition, Applied ® provides engineering, design and systems integration for industrial and fluid power applications, as well as customized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory management solutions that provide added value to its customers.", - "page_start": 0, - "page_end": 1, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "NOTE 15: SUBSEQUENT EVENT\nOn August 1, 2012, the Company acquired SKF's company-owned distribution businesses in Australia and New Zealand for cash consideration. These businesses will expand Applied's global capabilities and are part of the Service Center Based Distribution segment. The Company funded the acquisition from its available cash and existing revolving credit facilities. Results of operations acquired will be included in the Company's results of operations from the date of closing.\nApplied Industrial Technologies, Inc. and Subsidiaries\n37\nREPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM", - "page_start": 38, - "page_end": 39, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Coming of age and early reforms\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of Mazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring that he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government of my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] will assist me with your counsels when I ask for them. I request and order you to seal no orders except by my command . . . I order you not to sign anything, not even a passport . . . without my command; to render account to me personally each day and to favor no one\". [33] Capitalizing on the widespread public yearning for peace and order after decades of foreign and civil strife, the young king consolidated central political authority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, the historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of Louis\". [34]\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on bankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in 1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. Although Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's after him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le-\nRoyal Monogram\nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds.\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the remote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the Parlement found him guilty and sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" - }, - { - "text": "SE L E C T E D CO N S O L I D AT E D FI N A N C I A L DATA\nThe summary consolidated financial data set forth below have been derived from, and are qualified by re f e rence to, the audited consolidated financial statements of the Company and the notes thereto, pre p a red in conformity with generally accepted accounting principles as applied in the United States ('U.S. GAAP'), which have been audited by KPMG Polska Sp. z o.o., independent public accountants. The Company believes that the period-to-period comparisons of its financial results are not necessarily meaningful due to its significant acquisitions in December 1998 and J a n u a ry 1999, and should not be relied upon as an indication of future perf o rmance. The following information should be read in conjunction with 'Management's Discussion and Analysis of Financial Condition and Results of Operations' included herein.", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 12: Performance of each model for Bitext Mining, Semantic Textual Similarity (STS) and Summarization.\ndistilbert-base-fr-cased, Flor es_en-fr BitextMining = 0.65. distilbert-base-fr-cased, DiaBla_fr -en = 0.06. distilbert-base-fr-cased, STSBenchmarkMultilingual = 0.57. distilbert-base-fr-cased, STS22 STS = 0.43. distilbert-base-fr-cased, SICKFr = 0.62. distilbert-base-fr-cased, SummEv alFr Summarization = 0.31. , Flor es_fr -en = . , Flor es_en-fr BitextMining = . , DiaBla_fr -en = 0.70. , STSBenchmarkMultilingual = . , STS22 STS = . , SICKFr = . , SummEv alFr Summarization = . sentence-camembert-large, Flor es_fr -en = 0.99. sentence-camembert-large, Flor es_en-fr BitextMining = 1.00. sentence-camembert-large, DiaBla_fr -en = . sentence-camembert-large, STSBenchmarkMultilingual = 0.86. sentence-camembert-large, STS22 STS = 0.82. sentence-camembert-large, SICKFr = 0.78. sentence-camembert-large, SummEv alFr Summarization = 0.31. sentence-flaubert-base, Flor es_fr -en = 0.96. sentence-flaubert-base, Flor es_en-fr BitextMining = 0.97. sentence-flaubert-base, DiaBla_fr -en = 0.47. sentence-flaubert-base, STSBenchmarkMultilingual = 0.86. sentence-flaubert-base, STS22 STS = 0.74. sentence-flaubert-base, SICKFr = 0.78. sentence-flaubert-base, SummEv alFr Summarization = 0.31.", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv4.pdf" - }, - { - "text": "Long-Range Strategy: Translating Potential Into Results (continued)\nAs a leadership team, we have developed a long-range strategic plan to accelerate profitable growth. Our plan includes numerous growth opportunities across our business, and implementation is underway, including:\n· Leveraging sales capabilities and existing CRM (Customer Relationship Management) processes to expand our value-add and reach new customers\n· Strengthening our position in attractive vertical markets while growing in our core segments\n· Expanding our products and solutions; growing our core bearings and power transmission business at a rate greater than the market, along with focused product expansion via logical extensions and enhanced local capabilities\n· Building on our fluid power market leadership via strengthened product offerings and value-added services for OEM and MRO customers\n· Enhancing our operational excellence by capturing the full benefits of our ERP system and driving continuous improvement with customers, suppliers and throughout our operations\n· Accelerating strategic acquisitions by leveraging our cash generation and strong financial position to extend into new markets\nToday, nearly 90 years since our founding, we are well-positioned and committed to realizing our potential - a potential that builds upon a proud past and the dedication of our associates around the globe.\nAs we look ahead, we see a bright future with excellent opportunities for growth and increased profitability - organically, via acquisition, and through our technology investments. We are in exciting times, and we firmly believe our best days are ahead.\nThank you for your ongoing investment and support of Applied.\nNeil A. Schrimsher Chief Executive Officer\nBenjamin J. Mondics President & Chief Operating Officer\nAugust 15, 2012\n4\nApplied Industrial Technologies, Inc. and Subsidiaries\nCelebrating 90 Years of Strength in Distribution\nIn January 2013, Applied Industrial Technologies will celebrate its 90th anniversary. The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company, a distributor of bearings to customers in Cleveland, Ohio. Over the years, the Company grew to become a regional distributor of bearings, then an international distributor of a wide range of industrial technologies and components. Today, nearly 90 years since our beginning, customers served by Applied benefit from our years of accumulated experience, expertise and exceptional ability to improve our customers' operations.\nJoin us as we kick-off a year-long celebration of our strength in distribution. We thank all of you, our stakeholders, for making it possible.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_AIT_2012.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "By how much does Applied company plan to contribute to its pension benefits between 2018 and 2022 ?", - "target_page": 36, - "target_passage": "2018 through 2022 15,200", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Estimated Future Benefit Payments\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next five years and in the aggregate for the subsequent five years:\n2013, Pension Benefits = $ 6,200. 2013, Retiree Health Care Benefits = $ 240. 2014, Pension Benefits = 5,900. 2014, Retiree Health Care Benefits = 240. 2015, Pension Benefits = 5,700. 2015, Retiree Health Care Benefits = 240. 2016, Pension Benefits = 4,500. 2016, Retiree Health Care Benefits = 240. 2017, Pension Benefits = 1,700. 2017, Retiree Health Care Benefits = 260. 2018 through 2022, Pension Benefits = 15,200. 2018 through 2022, Retiree Health Care Benefits = 1,420\n34\nApplied Industrial Technologies, Inc. and Subsidiaries", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "12. PENSION AND PROFIT SHARING PLANS:\nThe Company has a defined benefit pension plan covering substantially all of its employees. The benefits are based on years of service and a percentage of the employee's qualifying compensation during the final years of employment. The Company's funding policy is to contribute annually the amount necessary to satisfy the Internal Revenue Service's funding standards. Contributions are intended to provide not only for benefits attributed to service to date but also for those expected to be earned in the future.\nF-21", - "page_start": 84, - "page_end": 84, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Employer Contributions\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in 2013. Contributions do not equal estimated future payments as certain payments are made from plan assets.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Pension Benefits\nWe offer contributory and non-contributory defined benefit pension plans that provide employees with a lifetime monthly pension on retirement.\n98 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nWe separately calculate our net obligation for each defined benefit plan by estimating the amount of future benefits that employees have earned in return for their service in the current and prior years, and discounting those benefits to determine their present value.\nWe accrue our pension plan obligations as employees provide the services necessary to earn the pension. We use a discount rate based on market yields on high quality corporate bonds at the measurement date to calculate the accrued pension benefit obligation. Remeasurements of the accrued pension benefit obligation are determined at the end of the year, and include actuarial gains and losses, return on plan assets and any change in the effect of the asset ceiling. These are recognized in other comprehensive income and retained earnings.\nThe cost of pensions is actuarially determined and takes into account the following assumptions and methods for pension accounting related to our defined benefit plans:\nGLYPH<129> the expected rates of salary increases for calculating increases in future benefits\nGLYPH<129> mortality rates for calculating the life expectancy of plan members, and\nGLYPH<129> past service costs from plan amendments are immediately expensed in net income.\nWe recognize contributions to defined contribution plans as an employee benefit expense in operating costs in the consolidated statements of income in the periods the employees provide the related services.\nSee note 22 for more information about our pension plans.", - "page_start": 101, - "page_end": 101, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Retiree Health Care Benefits\n-. Actual (loss) gain on plan assets, Pension Benefits.2012 = (30 ). Actual (loss) gain on plan assets, Pension Benefits.2011 = 984. Actual (loss) gain on plan assets, Retiree Health Care Benefits.2012 = -. Actual (loss) gain on plan assets, Retiree Health Care Benefits.2011. = -. Employer contributions, Pension Benefits.2012 = 4,557. Employer contributions, Pension Benefits.2011 = 1,699. Employer contributions, Retiree Health Care Benefits.2012 = 209. Employer contributions, Retiree Health Care Benefits.2011. = 190. Plan participants ' contributions, Pension Benefits.2012 = -. Plan participants ' contributions, Pension Benefits.2011 = -. Plan participants ' contributions, Retiree Health Care Benefits.2012 = 47. Plan participants ' contributions, Retiree Health Care Benefits.2011. = 37. Benefits paid, Pension Benefits.2012 = (4,144 ). Benefits paid, Pension Benefits.2011 = (1,856 ). Benefits paid, Retiree Health Care Benefits.2012 = (256 ). Benefits paid, Retiree Health Care Benefits.2011. = (227 ). Fair value of plan assets at end of year, Pension Benefits.2012 = $ 6,439. Fair value of plan assets at end of year, Pension Benefits.2011 = $ 6,056. Fair value of plan assets at end of year, Retiree Health Care Benefits.2012 = $ -. Fair value of plan assets at end of year, Retiree Health Care Benefits.2011. = $ -. Funded status at end of year, Pension Benefits.2012 = $ (40,712 ). Funded status at end of year, Pension Benefits.2011 = $ (47,434 ). Funded status at end of year, Retiree Health Care Benefits.2012 = $ (5,148 ). Funded status at end of year, Retiree Health Care Benefits.2011. = $ (4,667 )\nThe amounts recognized in the consolidated balance sheets and in accumulated other comprehensive income (loss) for the postemployment plans were as follows:", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Pension Obligations\nOur retiree pension plans had a funding deficit of approximately $172 million at December 31, 2013. We have been making special minimum monthly payments in addition to our regular contributions to eliminate the pension liability. During 2013, our funding deficit was reduced by $162 million.\nThe special payments, including contributions associated with benefits paid from the plans, were approximately $7 million in 2013. We expect our total estimated funding requirements to be $96 million in 2014 and to be adjusted annually thereafter, based on various market factors such as interest rates and expected returns and staffing assumptions.\nChanges in factors such as the discount rate, increase in compensation and the expected return on plan assets can affect the accrued benefit obligation, pension expense and the deficiency of plan assets over\naccrued obligations in the future. See Critical accounting estimates for more information.", - "page_start": 65, - "page_end": 65, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Retirement Benefits\nThe Company has defined contribution profit-sharing plans covering substantially all employees who are not participants in certain defined benefit plans. The Company's annual contribution to the defined contribution plans is based on employee eligible earnings and results of operations and amounted to $26,489,000, $23,524,000, and $24,826,000 in 2003, 2002, and 2001, respectively.\nThe Company sponsors defined benefit plans which include a limited number of salaried and hourly employees at certain subsidiaries. The Company's funding policy is generally to contribute annually the minimum actuarially computed amount. Net pension costs relating to these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, respectively. The actuarial present value of obligations, less related plan assets at fair value, is not significant.\nThe Company also participates in a multiemployer plan, which provides defined benefits to certain of the Company's union\nemployees. Pension expense for this plan amounted to $309,000, $309,000, and $310,000 in 2003, 2002, and 2001, respectively.", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Retiree Health Care Benefits\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. Premium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. Certain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a fiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health care benefits to eligible retired associates at no cost to the individual.\nThe Company uses a June 30 measurement date for all plans.\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the postemployment plans at June 30:\nChange in benefit obligation:, Pension Benefits.2012 = . Change in benefit obligation:, Pension Benefits.2011 = . Change in benefit obligation:, Retiree Health Care Benefits.2012 = . Change in benefit obligation:, Retiree Health Care Benefits.2011. = . Benefit obligation at beginning of the year, Pension Benefits.2012 = $ 53,490. Benefit obligation at beginning of the year, Pension Benefits.2011 = $ 51,114. Benefit obligation at beginning of the year, Retiree Health Care Benefits.2012 = $ 4,667. Benefit obligation at beginning of the year, Retiree Health Care Benefits.2011. = $ 4,593. Service cost, Pension Benefits.2012 = 289. Service cost, Pension Benefits.2011 = 460. Service cost, Retiree Health Care Benefits.2012 = 30. Service cost, Retiree Health Care Benefits.2011. = 39. Interest cost, Pension Benefits.2012 = 2,047. Interest cost, Pension Benefits.2011 = 2,232. Interest cost, Retiree Health Care Benefits.2012 = 237. Interest cost, Retiree Health Care Benefits.2011. = 235. Plan participants ' contributions, Pension Benefits.2012 = -. Plan participants ' contributions, Pension Benefits.2011 = -. Plan participants ' contributions, Retiree Health Care Benefits.2012 = 47. Plan participants '", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Retiree Health Care Benefits\n52. Interest cost, Pension Benefits.2012-- = 2,047. Interest cost, Pension Benefits.2011-- = 2,232. Interest cost, Pension Benefits.2010-- = 2,911. Interest cost, Retiree Health Care Benefits.2012-- = 237. Interest cost, Retiree Health Care Benefits.2011-- = 235. Interest cost, Retiree Health Care Benefits.2010-- = 259. Expected return on plan assets, Pension Benefits.2012-- = (396 ). Expected return on plan assets, Pension Benefits.2011-- = (385 ). Expected return on plan assets, Pension Benefits.2010-- = (351 ). Expected return on plan assets, Retiree Health Care Benefits.2012-- = -. Expected return on plan assets, Retiree Health Care Benefits.2011-- = -. Expected return on plan assets, Retiree Health Care Benefits.2010-- = -. Recognized net actuarial loss (gain), Pension Benefits.2012-- = 644. Recognized net actuarial loss (gain), Pension Benefits.2011-- = 1,449. Recognized net actuarial loss (gain), Pension Benefits.2010-- = 924. Recognized net actuarial loss (gain), Retiree Health Care Benefits.2012-- = (72 ). Recognized net actuarial loss (gain), Retiree Health Care Benefits.2011-- = (83 ). Recognized net actuarial loss (gain), Retiree Health Care Benefits.2010-- = (87 ). Amortization of prior service cost, Pension Benefits.2012-- = 412. Amortization of prior service cost, Pension Benefits.2011-- = 710. Amortization of prior service cost, Pension Benefits.2010-- = 797. Amortization of prior service cost, Retiree Health Care Benefits.2012-- = 139. Amortization of prior service cost, Retiree Health Care Benefits.2011-- = 139. Amortization of prior service cost, Retiree Health Care Benefits.2010-- = 148. Recognition of prior service cost upon plan curtailment, Pension Benefits.2012-- = 3,117. Recognition of prior service cost upon plan curtailment, Pension Benefits.2011-- = -. Recognition of prior service cost upon plan curtailment, Pension Benefits.2010-- = -. Recognition of prior", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Note 9. Retirement Plans\nThe Company maintains a noncontributory defined benefit pension plan and a separate defined contribution plan. The following table presents the defined benefit plan's funded status and amounts recognized in the Company's consolidated balance sheets.", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "What does Applied has to say regarding the potential creadit risk it could be exposed to ?", - "target_page": 21, - "target_passage": "The Company has a broad customer base representing many diverse industries primarily across North America. As such, the Company does not believe that a significant concentration of credit risk exists in its accounts receivable", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "2.4. Mental and behavioural disorders\n· 2.4.1. Post-traumatic stress disorder\n· 2.4.2. Other mental or behavioural disorders not mentioned in the preceding item where a direct link is established scientifically, or determined by methods appropriate to national conditions and practice, between the exposure to risk factors arising from work activities and the mental and behavioural disorder(s) contracted by the worker\nAnd there are also emerging and new risks where health data will not be available until a certain number of workers are exposed for quite a while . Some prominent examples are nanotechnologies, the significant increase of new chemically based technologies, vision impairment due to long hours of work under artificial light at the same distance with small digital equipment, 183 more exposure to 'global' biological agents due to more interactional tasks, and travel and transport between countries and continents. On that note, the Covid-19 pandemic could also be used as an example. In 2022, the Commission proposed an update of the Recommendation on the ESOD to recognise Covid-19 as an occupational disease for workers particularly concerned: health and social care, home help or where there is a proven risk of infection (during a pandemic) in other sectors 184 .\nIt adds to these difficulties that workers are often not only exposed to one disease causing exposure but to several exposures at the same time (exposure is understood here in a broad sense: ranging from long working hours over postures and movements to harassment and violence and to noise and chemical and biological substances, etc.). In theory, a single risk - if below the threshold limit values and in line with legislation and standards will not cause harm - given that it is the only exposure . The impact of this single exposure is not strong enough to generate a disease on the level of severity of a recognised occupational disease. A combination of several risks might add several exposures, worsen the impact and cause serious harm.\nQuite well studied is the increased prevalence of musculoskeletal diseases, if not only ergonomic risks but also high psychosocial risks are prevalent at the workplace. 185 Research has also found unexpected connections like the synergistic effect of noise and certain chemicals on hearing impairments. Such outcomes of multi-risk profiles are often particularly difficult to identify and understand. Obviously, most sectors and occupations involve workplaces with multi-risk profiles . Some prominent major risks in certain sectors or occupations are:", - "page_start": 75, - "page_end": 75, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Status of Risk Management System\nThe Company defines the risk as 'factors which may prevent the achievement of business objectives,' and tries to identify and evaluate such risks as soon as possible and to take necessary measures to minimize the probabilities that risk materialize and the damages.", - "page_start": 21, - "page_end": 21, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "7.4.4 On the way to better evidence - major data, research gaps and open questions\n· Impact of international and global supply chains on OSH: Does it improve or worsen the working conditions in the EU? Research could try to estimate the risk-reducing impact of the shift of some high-risk productions to enterprises outside the EU, for example, mining, base chemicals, recycling and so on (export of risks), and to estimate the OSH impact of EU export production, for example, vehicles, specialty chemicals, machines for risks at work inside the EU (import of risks).\n· It would also be a big step forward if research could achieve an agreed standard value or a standard range (as reliable as possible) for the attributable fraction of work to widespread diseases, that is, cardiovascular diseases, mental and behavioural disorders, musculoskeletal diseases and cancer.\n· Compliance with and impact of legislation. Currently, there are data on the percentage of enterprises with a risk assessment but very limited information about the quality of these risk assessments and of implemented risk management and reduction measures . Previous studies indicate that in many cases the risk assessment is conducted by an enterprise just to comply with legal obligations (paper compliance). A possible approach could be an anonymous evaluation of the quality of a representative share of risk assessments.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n140\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 139, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "NOTE 20: FINANCIAL RISK MANAGEMENT AND FINANCIAL INSTRUMENTS\nWe are exposed to credit risk, liquidity risk and market risk. Our primary risk management objective is to protect our income and cash flows and, ultimately, shareholder value. We design and implement the risk management strategies discussed below to ensure our risks and the related exposures are consistent with our business objectives and risk tolerance.", - "page_start": 116, - "page_end": 116, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Financial risk management\nThe Group's activities expose it to a variety of financial risks: market risk (including foreign currency risk, price risk, fair value risk, and interest rate risk), credit risk and liquidity risk.\nAt this point, the Directors believe that it is in the interest of shareholders to expose the Group to foreign currency risk, price risk and interest rate risk. Therefore, the Group does not employ any derivative hedging of foreign currency or interest rate risks though has entered into forward gold sale contracts to manage Australian gold price risk in respect of the forecast production from the Challenger Mine (refer 'commodity price risk' section below). The Directors and management monitor these risks, in particular market forecasts of future movements in foreign currency and prices movements and if it is to be believed to be in the interests of shareholders will implement risk management strategies to minimise potential adverse effects on the financial performance of the Group.\nRisk management is carried out by the senior executive team. The Board provides written principles for overall risk management, as well as policies covering specific areas, such as foreign exchange risk, interest rate risk, credit risk, use of derivative financial instruments and non-derivative financial instruments, and investment of excess liquidity.\nThe Group holds the following financial instruments:", - "page_start": 100, - "page_end": 100, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "It is somewhat surprising that a lack of awareness among management and staff seems to increase with establishment size.\nThe preparation of a document on health and safety responsibilities and procedures, which ideally should be made available to employees, is clearly reported by a vast majority of surveyed establishments in the EU27 (89% in both 2014 and 2019).\nConsistent with the findings in 2014, a total of 75% of establishments interviewed in the EU27 in ESENER 2019 indicate that they carry out risk assessments regularly . As expected, there is a positive correlation with establishment size. Several national studies show much fewer enterprises carrying out risk assessments, for example, only 50% in Germany, and SMEs even less. 412 Moreover, only a small percentage of companies carry out workplace risk assessments that will not only meet the essential procedural requirements but also take into consideration new and emerging risks in a comprehensive manner. 413\nParticularly difficult is the assessment of the quality of risk assessments . A complete quality assessment would require specific knowledge of several aspects: of the specific topic, of the - real situation at the workplaces in an enterprise, and of the expected reduction of these risks by the proposed or recommended risk mitigation measures. This has rarely been done. Moreover, even inside one enterprise the quality of a risk assessment might differ depending on the topic , for example, between 'easier' topics as 'correct provision of warning signals' or 'adequate temperatures', and more complex topics like psychosocial, musculoskeletal, or chemical and biological risks. 414\nEuropean Agency for Safety and Health at Work - EU-OSHA\n127\nOccupational safety and health in Europe - state and trends 2023\nIf a risk assessment is conducted just for compliance purposes , and not used appropriately for the successful management of OSH and reduction of accidents and occupational diseases, the risk assessment may lose its dynamic nature, and findings may be neither implemented nor communicated appropriately to employees.", - "page_start": 126, - "page_end": 127, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Mining risks and insurance risks\nThe mining industry is subject to significant risks and hazards, including environmental hazards, industrial accidents, unusual or unexpected geological conditions, unavailability of materials and unplanned equipment failures. These risks and hazards could result in significant costs or delays that could have a material adverse impact on the Group's financial performance and position.\nThe Group maintains insurance to cover some of these risks and hazards at levels that are believed to be appropriate for the circumstances surrounding each identified risk, however there remains the possibility that the level of insurance may not provide sufficient coverage for losses related to specific loss events.\ncontinued\nu\nDirect or s' Report", - "page_start": 46, - "page_end": 46, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Development Risk\nDevelopment risk is the risk that costs of developments will exceed original estimates, unforeseen delays occur and/or units will not be leased in the timeframe and/or at rents anticipated. Killam minimizes its exposure to development risk my limiting the amount of development underway at any one time. To reduce the Company's exposure to price increases, Killam enters into fixed-rate contracts when possible. To reduce the lease-up risk, Killam does extensive market research in advance of each development to support expected rental rates, and pre-markets its properties early on in the process, to increase demand for the new developments.\nKillam ProPerties inc | 2013 59", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "RISK MANAGEMENT\nWe are committed to continually strengthening our risk management capabilities to protect and enhance shareholder value. The purpose of risk management is not to eliminate risk but to optimize trade-offs between risk and return to maximize value to the organization.", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "It is somewhat surprising that a lack of awareness among management and staff seems to increase with establishment size.\nThe types of risks included in risk assessments are related to the risk profiles of different sectors, for example, it is likely that risk assessments in heavy industries and manual occupations focus more on safety risks. However, while sectoral risk profiles will naturally bias the identification of risks, smaller establishments seem to have less of a focus on MSDs or psychosocial risk factors , which would suggest that they are less well recognised or understood, in particular for MSEs. 415 Establishments also report that psychosocial risk factors are more difficult to manage than other OSH risks, while as business size grows, so does the proportion of respondents who perceive psychosocial risks as more difficult to manage than other OSH risks. 416\nESENER 2019 shows that a reluctance to talk openly about these issues seems to be the main difficulty for addressing psychosocial risks (60% of establishments in the EU27). This, as with all the other difficulties considered (lack of awareness among staff/management and lack of expertise or specialist support), is reported in all enterprise sizes but more frequently as establishment size grows.\nSpecifically, among those establishments that report having to deal with difficult customers, patients or pupils, 51% of those employing 20 or more workers report having a procedure in place to deal with possible cases of threats, abuse or assaults by clients, patients or other external persons. This share rises to 74% among establishments in human health and social work activities.\nThe development of concrete outputs such as measures to better manage risks that can result in musculoskeletal diseases has actually seen a decline between 2014 and 2019, as follows:\n· 85% to 77% on the measure of 'provision of equipment to help with the lifting or moving of loads or other physical heavy work'; 417\n· 73% to 67% concerning 'provision of ergonomic equipment'; and\n· 66% to 60% regarding 'encouraging regular breaks for people in uncomfortable or static postures including prolonged sitting'. 418\nEuropean Agency for Safety and Health at Work - EU-OSHA\n128\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 127, - "page_end": 128, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "To what system of logic do OWL ontologies belong to ?", - "target_page": 7, - "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3.1 Components of OWL Ontologies\nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in OWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from set theory are also implemented in OWL such as Disjoint sets, the Empty set ( owl:Nothing ), inverse\n1 http://protege.stanford.edu\n6\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document Overview of Set Theory available at:\nhttps://www.michaeldebellis.com/post/owl-theoretical-basics", - "page_start": 6, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 3 What are OWL Ontologies?\nOntologies are used to capture knowledge about some domain of interest. An ontology describes the concepts in the domain and also the relationships that hold between those concepts. Different ontology languages provide different facilities. The most recent development in standard ontology languages is OWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can be found at: https://www.w3.org/TR/owl2-primer/\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. Complex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner which can check whether all of the statements and definitions in the ontology are mutually consistent and can also recognize which concepts fit under which definitions. The reasoner can therefore help to maintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can have more than one parent. The reasoner can also infer additional information. For example, if two properties are inverses only one value needs to be asserted by the user and the inverse value will be automatically inferred by the reasoner.", - "page_start": 6, - "page_end": 6, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Systems of logic\nSystems of logic are theoretical frameworks for assessing the correctness of reasoning and arguments. For over two thousand years, Aristotelian logic was treated as the canon of logic in the Western world, [104] but modern developments in this field have led to a vast proliferation of logical systems. [105] One prominent categorization divides modern formal logical systems into classical logic, extended logics, and deviant logics. [106]", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia1.pdf" - }, - { - "text": "See also\nGlossary of logic\nOutline of logic - Overview of and topical guide to logic\nCritical thinking - Analysis of facts to form a judgment\nList of logic journals\nList of logic symbols - List of symbols used to express logical relations\nList of logicians\nLogic puzzle - Puzzle deriving from the mathematics field of deduction\nLogical reasoning - Process of drawing correct inferences\nLogos - Concept in philosophy, religion, rhetoric, and psychology\nVector logic", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "History\nLogic was developed independently in several cultures during antiquity. One major early contributor was Aristotle, who developed term logic in his Organon and Prior Analytics . [183] He was responsible for the introduction of the hypothetical syllogism [184] and temporal modal logic. [185] Further innovations include inductive logic [186] as well as the discussion of new logical concepts such as terms, predicables, syllogisms, and propositions. Aristotelian logic was highly regarded in classical and medieval times, both in Europe and the Middle East. It remained in wide use in the West until the early 19th century. [187] It has now been superseded by later work, though many of its key insights are still present in modern systems of logic. [188]\nIbn Sina (Avicenna) was the founder of Avicennian logic, which replaced Aristotelian logic as the dominant system of logic in the Islamic world. [189] It influenced Western medieval writers such as Albertus Magnus and William of Ockham. [190] Ibn Sina wrote on the hypothetical syllogism [191] and on the propositional calculus. [192] He developed an original \"temporally modalized\" syllogistic theory, involving temporal logic and modal logic. [193] He also made use of inductive logic, such as his methods of agreement, difference, and concomitant variation, which are critical to the scientific method. [191] Fakhr al-Din al-Razi was another influential Muslim logician. He criticized Aristotelian syllogistics and formulated an early system of inductive logic, foreshadowing the system of inductive logic developed by John Stuart Mill. [194]", - "page_start": 15, - "page_end": 16, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Philosophy of logic and philosophical logic\nPhilosophy of logic is the philosophical discipline studying the scope and nature of logic. [59] It examines many presuppositions implicit in logic, like how to define its basic concepts or the metaphysical assumptions associated with them. [158] It is also concerned with how to classify logical systems and considers the ontological commitments they incur. [159] Philosophical logic is one of the areas within the philosophy of logic. It studies the application of logical methods to philosophical problems in fields like metaphysics, ethics, and epistemology. [160] This application usually happens in the form of extended or deviant logical systems. [161]", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Formal logic\nThe term \"logic\" can also be used in a slightly different sense as a countable noun. In this sense, a logic is a logical formal system. Distinct logics differ from each other concerning the rules of inference they accept as valid and the formal languages used to express them. [21] Starting in the late 19th century, many\nnew formal systems have been proposed. There are disagreements about what makes a formal system a logic. [22] For example, it has been suggested that only logically complete systems, like first-order logic, qualify as logics. For such reasons, some theorists deny that higher-order logics are logics in the strict sense. [23]", - "page_start": 1, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic\nArguments can be either correct or incorrect. An argument is correct if its premises support its conclusion. Deductive arguments have the strongest form of support: if their premises are true then their conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new information not found in the premises. Many arguments in everyday discourse and the sciences are ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are statistical generalization-such as inferring that all ravens are black, based on many individual observations of black ravens. [2] Abductive arguments are inferences to the best explanation-for example, when a doctor concludes that a patient has a certain disease, as the best explanation for the symptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the correctness of arguments.\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the main system of logic in the Western world until it was replaced by modern formal logic, which has its roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic only considers logical relations between full propositions. First-order logic also takes the internal parts of\npropositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant logics, on the other hand, reject certain classical intuitions and provide alternative explanations of the basic laws of logic.", - "page_start": 0, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Definition\nThe word \"logic\" originates from the Greek word logos , which has a variety of translations, such as reason, discourse, or language. [4] Logic is traditionally defined as the study of the laws of thought or correct reasoning, [5] and is usually understood in terms of inferences or arguments. Reasoning is the activity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a set of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. whether their premises support the conclusion. [7] These general characterizations apply to logic in the widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the correctness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict logic to formal logic. [9]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Chapter 7 Names: IRI's, Labels, and Namespaces\n9 IRIs are also sometimes called URIs. A URI is the same as an IRI except that URIs only support ASCII characters whereas IRIs can support other character sets such as Kanji. The term people use these days is usually IRI.\n60\nnext section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology about telecommunications. You might also have a class called Network in an ontology about graph theory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when you referred to the Network class for the Telecom ontology you would use tc:Network and gt:Network for the graph theory class.\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl and is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description Framework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.", - "page_start": 60, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "Concerning ontologies, what is an anonymous class ?", - "target_page": 30, - "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "4.10 Describing and Defining Classes\nNow that we have defined some properties, we can use these properties to define some more interesting classes. There are 3 types of classes in OWL:\n1. Primitive classes. These are classes that are defined by conditions that are necessary (but not sufficient) to hold for any individuals that are instances of that class or its subclasses. The condition may be as simple as: Class A is a subclass of class B . To start with we will define primitive classes first and then defined classes. When the reasoner encounters an individual that is an instance of a primitive class it infers that all the conditions defined for that class must hold for that individual.\n2. Defined classes. These are classes that are defined by both necessary and sufficient conditions. When the reasoner encounters an individual that satisfies all the conditions for a defined class it will make the inference that the individual is an instance of that class. The reasoner can also use the conditions defined on classes to change the class hierarchy, e.g., to infer that Class A is a subclass of Class B . We will see examples of this later in the tutorial.\n3. Anonymous classes. These are classes that you won't encounter much and that won't be discussed much in this tutorial, but it is good to know about them. They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes.", - "page_start": 29, - "page_end": 29, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.10.1 Property restrictions\n· Existential restrictions describe classes of individuals that participate in at least one relation along a specified property. For example, the class of individuals who have at least one (or some) hasTopping relation to instances of VegetableTopping . In OWL the keyword some is used to denote existential restrictions.\n· Universal restrictions describe classes of individuals that for a given property only have relations along a property to individuals that are members of a specific class. For example, the class of individuals that only have hasTopping relations to instances of the class VegetableTopping . In OWL they keyword only is used for universal restrictions.\nLet's take a closer look at an example of an existential restriction. The restriction hasTopping some MozzarellaTopping is an existential restriction (as indicated by the some keyword), which restricts the hasTopping property, and has a filler MozzarellaTopping . This restriction describes the class of individuals that have at least one hasTopping relationship to an individual that is a member of the class MozzarellaTopping .\nA restriction always describes a class. Sometimes (as we will soon see) it can be a defined class. Other times it may be an anonymous class. In all cases the class contains all of the individuals that satisfy the restriction, i.e., all of the individuals that have the relationships required to be a member of the class. In section 9.2 one of our SPARQL queries will return several anonymous classes.\n6 These have the same meaning as existential and universal quantification in First Order Logic.\n30\nThe restrictions for a class are displayed and edited using the Class Description View shown in Figure 4.17. The Class Description View holds most of the information used to describe a class. The Class Description View is a powerful way of describing and defining classes. It is one of the most important differences between describing classes in OWL and in other models such as most object-oriented programming languages. In other models there is no formal definition that describes why one class is a subclass of another, in OWL there is. Indeed, the OWL classifier can actually redefine the class hierarchy based on the logical restrictions defined by the user. We will see an example of this later in the tutorial.", - "page_start": 30, - "page_end": 31, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 3 What are OWL Ontologies?\nOntologies are used to capture knowledge about some domain of interest. An ontology describes the concepts in the domain and also the relationships that hold between those concepts. Different ontology languages provide different facilities. The most recent development in standard ontology languages is OWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can be found at: https://www.w3.org/TR/owl2-primer/\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. Complex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner which can check whether all of the statements and definitions in the ontology are mutually consistent and can also recognize which concepts fit under which definitions. The reasoner can therefore help to maintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can have more than one parent. The reasoner can also infer additional information. For example, if two properties are inverses only one value needs to be asserted by the user and the inverse value will be automatically inferred by the reasoner.", - "page_start": 6, - "page_end": 6, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.10.1 Property restrictions\nIn OWL properties define binary relations with the same semantics and characteristics as binary relations in First Order Logic. There are two types of OWL properties for describing a domain: Object properties and Data properties. Object properties have classes as their domain and range. Data properties have classes as their domain and simple datatypes such as xsd:string or xsd:dateTime as their range. In figure 3.3 the individual Michael is related to the individual USA by the property livesIn . Consider all the individuals who are an instance of Person and also have the same relation, that each livesIn the USA . This group is a set or OWL class such as USAResidents . In OWL a class can be defined by describing the various properties and values that hold for all individuals in the class. Such definitions are called restrictions in OWL.\n29\nThe following are some examples of classes of individuals that we might want to define via property restrictions:\n· The class of individuals with at least one hasChild relation.\n· The class of individuals with 2 or more hasChild relations.\n· The class of individuals that have at least one hasTopping relationship to individuals that are members of MozzarellaTopping - i.e. the class of things that have at least a mozzarella topping.\n· The class of individuals that are Pizzas and only have hasTopping relations to instances of the class VegetableTopping (i.e., VegetarianPizza ).\nIn OWL we can describe all of the above classes using restrictions. OWL restrictions fall into three main categories:\n1. Quantifier restrictions. These describe that a property must have some or all values that are of a particular class.\n2. Cardinality restrictions. These describe the number of individuals that must be related to a class by a specific property.\n3. hasValue restrictions. These describe specific values that a property must have.\nWe will initially use quantifier restrictions. Quantifier restrictions can be further categorized as existential restrictions and universal restrictions 6 . Both types of restrictions will be illustrated with examples in this tutorial.", - "page_start": 29, - "page_end": 30, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.1.3 Classes\nOWL classes are sets that contain individuals. They are described using formal (mathematical) descriptions that rigorously define the requirements for membership of the class. For example, the class Cat would contain all the individuals that are cats in our domain of interest. 2 Classes may be organized into a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often trees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and multiple inheritance can be a powerful tool to represent data in an intuitive manner.\nSubclasses specialize (aka are subsumed by ) their superclasses. For example, consider the classes Animal and Dog -Dog might be a subclass of Animal (so Animal is the superclass of Dog ). This says that All dogs are animals , All members of the class Dog are members of the class Animal . OWL and Protégé\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where multiple inheritance is typically unavailable or discouraged it is common in OWL.\n8\nprovide a language that is called Description Logic or DL for short. One of the key features of DL is that these superclass-subclass relationships (aka subsumption relationships) can be computed automatically by a reasoner - more on this later. Figure 3.3 shows a representation of some classes containing individuals classes are represented as ovals, like sets in Venn diagrams.\nIn OWL classes can be built up of descriptions that specify the conditions that must be satisfied by an individual for it to be a member of the class. How to formulate these descriptions will be explained as the tutorial progresses.\n9", - "page_start": 8, - "page_end": 9, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.1 Size Doesn't Guarantee Diversity\nmost similar to the ones used in GPT-2's training data, i.e. documents linked to from Reddit [25], plus Wikipedia and a collection of books. While this was reportedly effective at filtering out documents that previous work characterized as 'unintelligible' [134], what is unmeasured (and thus unknown) is what else it filtered out. The Colossal Clean Crawled Corpus [107], used to train a trillion parameter LM in [43], is cleaned, inter alia , by discarding any page containing one of a list of about 400 'Dirty, Naughty, Obscene or Otherwise Bad Words' [p.6]. 14 This list is overwhelmingly words related to sex, with a handful of racial slurs and words related to white supremacy (e.g. swastika , white power ) included. While possibly effective at removing documents containing pornography (and the associated problematic stereotypes encoded in the language of such sites [125]) and certain kinds of hate speech, this approach will also undoubtedly attenuate, by suppressing such words as twink , the influence of online spaces built by and for LGBTQ people. 15 If we filter out the discourse of marginalized populations, we fail to provide training data that reclaims slurs and otherwise describes marginalized identities in a positive light.\nThus at each step, from initial participation in Internet fora, to continued presence there, to the collection and finally the filtering of training data, current practice privileges the hegemonic viewpoint. In accepting large amounts of web text as 'representative' of 'all' of humanity we risk perpetuating dominant viewpoints, increasing power imbalances, and further reifying inequality. We instead propose practices that actively seek to include communities underrepresented on the Internet. For instance, one can take inspiration from movements to decolonize education by moving towards oral histories due to the overrepresentation of colonial views in text [35, 76, 127], and curate training datasets through a thoughtful process of deciding what to put in, rather than aiming solely for scale and trying haphazardly to weed out, post-hoc, flotsam deemed 'dangerous', 'unintelligible', or 'otherwise bad'.", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "9.21 Some SPARQL Pizza Queries\nHowever, classes and properties themselves are also represented as triples. So for example, when you create the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to the ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class . Similarly when you add NamedPizza as a subclass of Pizza , Protégé adds the triple: NamedPizza rdfs: s ubClassOf Pizza .\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities that are the subjects of triples where the predicate is rdfs: s ubClassOf and the object is any other entity. The ? before a name indicates that the name is a wildcard that can match anything that fits with the rest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate or even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this case our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the name of a class while in others it is a class expression with an orange circle in front of it. This is because when defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL axioms.\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query determines what to match in the query. If you want to display everything matched in the WHERE clause you can just use a * for the SELECT clause. The initial default query in this tab is set up with no knowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes regardless of the ontology. To get information about Pizzas the first thing we need to do is to add another prefix to the beginning of the query. In our case the Pizza ontology has been set up with a mapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab discussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement:", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Existing Project Example : The Pile v2 27\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile - a large, diverse, open dataset for AI training. EleutherAI developed it not only to support their own training of LLMs, but also to lower the barriers for others. 28\nAlong with data drawn from the web at large, The Pile included books from three datasets. The first dataset was the Books3 corpus referenced at the outset of this paper. The second and third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books by otherwise unpublished authors; and a 28,752 books in the public domain and published prior to 1919, drawn from a volunteer effort to digitize public domain works called Project Gutenberg.\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright notices to have the dataset taken down from various websites.\nDespite the takedown requests, the importance of books to EleutherAI and the broader community's AI research remained. In hoping to forge a path forward EleutherAI announced in 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29 Among other things, v2 would 'have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.' At the same time, it would only seek to include public domain books and permissively licensed content. As before, this corpus focuses on English language books.\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27 Common Corpus project, which includes an array of public domain books from a number of countries, at https://huggingface.co./blog/Pclanglais/common-corpus; see also https://huggingface.co./datasets/ storytracer/internet_archive_books_en ('This dataset contains more than 650,000 English public domain books (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the Open Library project.')\nSee Gao et al, supra note 8. 28", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Knowledge representation\nKnowledge representation and knowledge engineering [17] allow AI programs to answer questions intelligently and make deductions about real-world facts. Formal knowledge representations are used in content-based indexing and retrieval, [18] scene interpretation, [19] clinical decision support, [20] knowledge discovery (mining \"interesting\" and actionable inferences from large databases), [21] and other areas. [22]\nA knowledge base is a body of knowledge represented in a form that can be used by a program. An ontology is the set of objects, relations, concepts, and properties used by a particular domain of knowledge. [23] Knowledge bases need to represent things such as objects, properties, categories, and relations between objects; [24] situations, events, states, and time; [25] causes and effects; [26] knowledge about knowledge (what we know about what other people\nAn ontology represents knowledge as a set of concepts within a domain and the relationships between those concepts.\nknow); [27] default reasoning (things that humans assume are true until they are told differently and will remain true even when other facts are changing); [28] and many other aspects and domains of knowledge.\nAmong the most difficult problems in knowledge representation are the breadth of commonsense knowledge (the set of atomic facts that the average person knows is enormous); [29] and the sub-symbolic form of most commonsense knowledge (much of what people know is not represented as \"facts\" or \"statements\" that they could express verbally). [16] There is also the difficulty of knowledge acquisition, the problem of obtaining knowledge for AI applications. [c]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Chapter 1 Introduction\nThis introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions specific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you have general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the User Support for Protégé and Web Protégé email list. This list has many people (including me) who monitor it and can contribute their knowledge to help you understand how to get the most out of this technology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first orange Subscribe button. That will enable you to subscribe to the list and give you the email to send questions to.\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the requirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of the OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object properties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the ontology and automatically compute the ontology class hierarchy.\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: adding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of an OWL entity.\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology has a small number of instances and property values already created which can be used to illustrate the tools in the later chapters for writing rules, doing queries, and defining constraints.\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter 10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and SQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the difference between defining logical axioms in Description Logic and data integrity constraints in SHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography.", - "page_start": 4, - "page_end": 4, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "When to use an enumerated class in OWL ontologies ?", - "target_page": 46, - "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "3.1 Components of OWL Ontologies\nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in OWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from set theory are also implemented in OWL such as Disjoint sets, the Empty set ( owl:Nothing ), inverse\n1 http://protege.stanford.edu\n6\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document Overview of Set Theory available at:\nhttps://www.michaeldebellis.com/post/owl-theoretical-basics", - "page_start": 6, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.1 Named Classes\nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. 4 All empty ontologies contains one class called owl:Thing . OWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing all individuals. Because of this all classes are subclasses of owl:Thing .\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the Class hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or to create them as independent tabs.\n13", - "page_start": 13, - "page_end": 13, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.14 Defining an Enumerated Class\nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. The idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a specific code library. One of the first and most common design patterns was the Model-View-Controller pattern first used in Smalltalk and now almost the default standard for good user interface design. Since there are significant differences between OWL and standard OOP the many excellent books on OOP design patterns don't directly translate into OWL design patterns. Also, since the use of OWL is more recent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP community has. However, there are already many design patterns that have been documented for OWL and that can provide users with ways to save time and to standardize their designs according to best practices.\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value. We will show an example of such an enumerated class by creating a new\n44\nproperty called hasSpiciness with only a few possible values ranging from Mild to Hot . In this section we will also create the first individuals in our ontology.\nExercise 24: Create an Enumerated Class to Represent the Spiciness of a Pizza\n_____________________________________________________________________________________", - "page_start": 44, - "page_end": 45, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 3 What are OWL Ontologies?\nOntologies are used to capture knowledge about some domain of interest. An ontology describes the concepts in the domain and also the relationships that hold between those concepts. Different ontology languages provide different facilities. The most recent development in standard ontology languages is OWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can be found at: https://www.w3.org/TR/owl2-primer/\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. Complex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner which can check whether all of the statements and definitions in the ontology are mutually consistent and can also recognize which concepts fit under which definitions. The reasoner can therefore help to maintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can have more than one parent. The reasoner can also infer additional information. For example, if two properties are inverses only one value needs to be asserted by the user and the inverse value will be automatically inferred by the reasoner.", - "page_start": 6, - "page_end": 6, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 7 Names: IRI's, Labels, and Namespaces\n9 IRIs are also sometimes called URIs. A URI is the same as an IRI except that URIs only support ASCII characters whereas IRIs can support other character sets such as Kanji. The term people use these days is usually IRI.\n60\nnext section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology about telecommunications. You might also have a class called Network in an ontology about graph theory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when you referred to the Network class for the Telecom ontology you would use tc:Network and gt:Network for the graph theory class.\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl and is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description Framework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.", - "page_start": 60, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.1.3 Classes\nOWL classes are sets that contain individuals. They are described using formal (mathematical) descriptions that rigorously define the requirements for membership of the class. For example, the class Cat would contain all the individuals that are cats in our domain of interest. 2 Classes may be organized into a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often trees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and multiple inheritance can be a powerful tool to represent data in an intuitive manner.\nSubclasses specialize (aka are subsumed by ) their superclasses. For example, consider the classes Animal and Dog -Dog might be a subclass of Animal (so Animal is the superclass of Dog ). This says that All dogs are animals , All members of the class Dog are members of the class Animal . OWL and Protégé\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where multiple inheritance is typically unavailable or discouraged it is common in OWL.\n8\nprovide a language that is called Description Logic or DL for short. One of the key features of DL is that these superclass-subclass relationships (aka subsumption relationships) can be computed automatically by a reasoner - more on this later. Figure 3.3 shows a representation of some classes containing individuals classes are represented as ovals, like sets in Venn diagrams.\nIn OWL classes can be built up of descriptions that specify the conditions that must be satisfied by an individual for it to be a member of the class. How to formulate these descriptions will be explained as the tutorial progresses.\n9", - "page_start": 8, - "page_end": 9, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.10.1 Property restrictions\nIn OWL properties define binary relations with the same semantics and characteristics as binary relations in First Order Logic. There are two types of OWL properties for describing a domain: Object properties and Data properties. Object properties have classes as their domain and range. Data properties have classes as their domain and simple datatypes such as xsd:string or xsd:dateTime as their range. In figure 3.3 the individual Michael is related to the individual USA by the property livesIn . Consider all the individuals who are an instance of Person and also have the same relation, that each livesIn the USA . This group is a set or OWL class such as USAResidents . In OWL a class can be defined by describing the various properties and values that hold for all individuals in the class. Such definitions are called restrictions in OWL.\n29\nThe following are some examples of classes of individuals that we might want to define via property restrictions:\n· The class of individuals with at least one hasChild relation.\n· The class of individuals with 2 or more hasChild relations.\n· The class of individuals that have at least one hasTopping relationship to individuals that are members of MozzarellaTopping - i.e. the class of things that have at least a mozzarella topping.\n· The class of individuals that are Pizzas and only have hasTopping relations to instances of the class VegetableTopping (i.e., VegetarianPizza ).\nIn OWL we can describe all of the above classes using restrictions. OWL restrictions fall into three main categories:\n1. Quantifier restrictions. These describe that a property must have some or all values that are of a particular class.\n2. Cardinality restrictions. These describe the number of individuals that must be related to a class by a specific property.\n3. hasValue restrictions. These describe specific values that a property must have.\nWe will initially use quantifier restrictions. Quantifier restrictions can be further categorized as existential restrictions and universal restrictions 6 . Both types of restrictions will be illustrated with examples in this tutorial.", - "page_start": 29, - "page_end": 30, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "A Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins\nPreprint · April 2021\nCITATIONS\n0", - "page_start": 0, - "page_end": 0, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 1 Introduction\nThis introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions specific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you have general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the User Support for Protégé and Web Protégé email list. This list has many people (including me) who monitor it and can contribute their knowledge to help you understand how to get the most out of this technology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first orange Subscribe button. That will enable you to subscribe to the list and give you the email to send questions to.\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the requirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of the OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object properties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the ontology and automatically compute the ontology class hierarchy.\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: adding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of an OWL entity.\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology has a small number of instances and property values already created which can be used to illustrate the tools in the later chapters for writing rules, doing queries, and defining constraints.\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter 10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and SQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the difference between defining logical axioms in Description Logic and data integrity constraints in SHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography.", - "page_start": 4, - "page_end": 4, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "9.21 Some SPARQL Pizza Queries\nTo start with go to the SPARQL Query tab. If it isn't already there you can as always add it using Window>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the bottom which holds the results. There should be some text already there. It may look confusing, but we'll explain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of classes and class expressions returned.\n67\nTo understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from since you didn't add them to your ontology. The answer is that every OWL ontology comes with a set of namespaces and prefixes that are required to define the ontology.\nAlso, to understand SPARQL you need to 'peak under the hood' of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example Customer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.", - "page_start": 67, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Howcan I specify to Content Manager OnDemand to store the data on the server on which the program runs ?", - "target_page": 121, - "target_passage": "Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "1.3.2 Content Manager OnDemand server components\nA Content Manager OnDemand server environment contains several components:", - "page_start": 34, - "page_end": 34, - "source_file": "sg246915.pdf" - }, - { - "text": "15.4.1 Base configuration in Content Manager OnDemand\nTo enable FTS in Content Manager OnDemand, FTS must be enabled for each of your Content Manager OnDemand instances. In Windows, you enable FTS for each of your Content Manager OnDemand instances in the Content Manager OnDemand Configurator by selecting the Enable Full Text Index and Search check box on the Server (Advanced Options) window.\nOn all other platforms, the ars.cfg file of your Content Manager OnDemand instance must be edited. You must add the following line:\nARS_SUPPORT_FULL_TEXT_INDEX=1\nYou must restart the instance after this configuration to enable the FTS option in the Content Manager OnDemand Administrator. Then, you can configure the FTS options on the application groups and folders.", - "page_start": 365, - "page_end": 366, - "source_file": "sg246915.pdf" - }, - { - "text": "Adding a Content Manager OnDemand repository to Content Navigator\nMultiple Content Manager OnDemand repositories can be added to a Content Navigator installation, exposing each repository to a defined set of users through the configuration of different desktops.\nChapter 8. User clients\n195\n196\nIBM Content Manager OnDemand Guide\nFor the configuration of Content Manager OnDemand repositories, you need the following parameters:\n/SM590000 Display name: The depository name that is displayed to the users.\n/SM590000 Server name: IP or host name of the Content Manager OnDemand server.\n/SM590000 Port number: Instance port (the default is 1445).\n/SM590000 If you want an encrypted connection between ODWEK and the Content Manager OnDemand server, enable Secure Sockets Layer (SSL) and provide an SSL key ring database and stash file. Enabling SSL consumes additional resources on both systems (Content Manager OnDemand and the web tier).\nNote: This option does not affect the SSL security of the web application, for example, between the web server and the browser. It only encrypts the API communication between the web tier and the Content Manager OnDemand server.\n/SM590000 If you want to use AFP Transforms or another transform filter through generic transforms, you must specify the path to the correct configuration files.\nYou can specify additional configuration parameters, for example, in the ODConfig class in the Java API. For more information, see the Javadoc of ODApi or IBM Content Manager OnDemand Web Enablement Kit Java APIs: The Basics and Beyond , SG24-7646.", - "page_start": 218, - "page_end": 219, - "source_file": "sg246915.pdf" - }, - { - "text": "Creating a user\nNew installations (instances) of Content Manager OnDemand can be configured to run under a user other than the root user. If you plan to run an instance under a user other than root, complete the following steps:\n1. Create the user for the Content Manager OnDemand instance owner that is a member of the database owners group.\n2. Give the user administrator authority to the database.\n3. Set permissions for the cache storage file systems.\n4. Set permissions for the Content Manager OnDemand configuration and script files.\n5. Give the instance owner permission to write to the system console.\n6. Specify the instance owner in the ARS.INI file.\nIf you plan to run a distributed library and object server system, with one or more object servers on different workstations or nodes than the library server, you must also configure Content Manager OnDemand on the object servers.\nTo configure Content Manager OnDemand on the object servers, complete the following steps:\n1. Create a group and user for the Content Manager OnDemand instance owner.\n2. Give ownership of the cache storage file systems that are listed in the ARS.CACHE file to the group and user for the Content Manager OnDemand instance owner.\nChapter 2. Setting up a Content Manager OnDemand instance\n19\n20\nIBM Content Manager OnDemand Guide\n3. Give permission to read the following files to the Content Manager OnDemand instance owner:\n-ARS.CACHE\n-ARS.CFG\n-ARS.INI\n-ARS.DBFS\n4. Give permission to write to the console to the Content Manager OnDemand instance owner.", - "page_start": 42, - "page_end": 43, - "source_file": "sg246915.pdf" - }, - { - "text": "13.1.1 Content Manager OnDemand configuration\nHow reports are defined, indexed, and stored within Content Manager OnDemand greatly influences the speed at which Content Manager OnDemand can retrieve them. Various hints and tips for the optimum way to define reports within Content Manager OnDemand are described in Chapter 3, 'Administration' on page 45.", - "page_start": 321, - "page_end": 321, - "source_file": "sg246915.pdf" - }, - { - "text": "10.6 Expiring data on Content Manager OnDemand for i\nIn most circumstances, you must run Disk Storage Management (DSM) and Archived Storage Management (ASM) to expire data from Content Manager OnDemand for i.", - "page_start": 262, - "page_end": 262, - "source_file": "sg246915.pdf" - }, - { - "text": "3.1 Report administration\nReport design and definition are key to a successful implementation of a Content Manager OnDemand system. Knowledge of the data that will be indexed, loaded, and retrieved, with knowledge of Content Manager OnDemand preferred practices, results in the most efficient and easy-to-use system possible. In this section, we consider the processes that are followed when you define a Content Manager OnDemand report. We present hints and tips to help in the design and implementation process.\nThe system components that are required for creating, retrieving, and viewing a Content Manager OnDemand report are a storage set, an application group, an application, and a folder. Optionally, cabinets might be used to organize and simplify folder access. These elements, in combination, allow the Content Manager OnDemand administrator to define and create a report definition that can then be used to index and load data into Content Manager OnDemand. Figure 3-1 illustrates the relationship of these elements in a typical Content Manager OnDemand system.\nFigure 3-1 Content Manager OnDemand system components relationship\nTo help you better understand how to perform report administration, we use the example company that is mentioned in 1.2.1, 'Background information of an example company' on page 6 with the Content Manager OnDemand Administrator Client running on Windows to create the required system components. We use the monthly credit card statements that are generated by AFinancial Co in our example. These statements are stored in a single application group in Content Manager OnDemand.", - "page_start": 69, - "page_end": 69, - "source_file": "sg246915.pdf" - }, - { - "text": "6.8 Summary\nContent Manager OnDemand provides a secure environment. Security features within Content Manager OnDemand allow access control to the data and the APIs that access the data. The data itself is controlled at rest and in motion (SSL). Additional exits that are external to Content Manager OnDemand can be created that allow the creation of customized extensions to the Content Manager OnDemand internal security.\nChapter 6. Security\n157\n158\nIBM Content Manager OnDemand Guide\nPart\n2", - "page_start": 180, - "page_end": 182, - "source_file": "sg246915.pdf" - }, - { - "text": "5.2.2 Configuring Content Manager OnDemand for Tivoli Storage Manager archive management\nTo enable Content Manager OnDemand to use Tivoli Storage Manager as the archive manager for the system, you must set Content Manager OnDemand options to allow the system to recognize that Tivoli Storage Manager is configured for archive storage.\n92\nIBM Content Manager OnDemand Guide\nIn a Content Manager OnDemand for Windows system, the Content Manager OnDemand configurator is used to set this parameter. In a Content Manager OnDemand for UNIX or Linux system, the ars.cfg configuration file is updated to specify that Tivoli Storage Manager is used.\nIn this section, we describe how you can configure Content Manager OnDemand to use Tivoli Storage Manager on both Windows and UNIX or Linux systems.", - "page_start": 115, - "page_end": 116, - "source_file": "sg246915.pdf" - }, - { - "text": "Server commands\nIn addition to the API options, which are exposed through Java, OLE, or Web Services, Content Manager OnDemand provides console (command-line) applications that provide specific functions, such as searching, retrieving, or deleting documents, and sophisticated functions, such as placing holds and working with the full text engine. Most of this functionality is exposed through the ARSDOC application.\nSimpler custom applications, for example, shell scripts, can use these server console applications to interact with Content Manager OnDemand systems. The applications are available only as part of a Content Manager OnDemand server installation. Because most of them (namely ARSDOC ) communicate with the server through TCP/IP, you can connect and interact with Content Manager OnDemand servers remotely on other platforms. When you call remote servers, ensure that the local installation that provides the ARS applications and the actual Content Manager OnDemand server are on the same version level.\nFor more information about the administrative commands, see the specific command descriptions in the IBM Content Manager OnDemand Knowledge Center:\nhttp://www.ibm.com/support/knowledgecenter/SSEPCD_9.0.0/com.ibm.ondemandtoc.doc/ad ministering.htm", - "page_start": 228, - "page_end": 228, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Does the XML indexer of Content Manager OnDemand support large objects ?", - "target_page": 188, - "target_passage": "No", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "6.8 Summary\nContent Manager OnDemand provides a secure environment. Security features within Content Manager OnDemand allow access control to the data and the APIs that access the data. The data itself is controlled at rest and in motion (SSL). Additional exits that are external to Content Manager OnDemand can be created that allow the creation of customized extensions to the Content Manager OnDemand internal security.\nChapter 6. Security\n157\n158\nIBM Content Manager OnDemand Guide\nPart\n2", - "page_start": 180, - "page_end": 182, - "source_file": "sg246915.pdf" - }, - { - "text": "3.3.1 Using the XML Batch Administration program\nThis section provides a brief explanation of how to use the new XML batch program. For more information, see IBM Content Manager OnDemand for Multiplatforms - Administration Guide , SC19-3352.\nThe Batch Administration program is called arsxml . With this XML batch program, you can export, add, delete, and update Content Manager OnDemand objects.\nTo use the program, you must have the following files:\n/SM590000 The schema file, ondemand.xsd\n/SM590000 An input XML file (for example, exportusers.xml )\n/SM590000 A password stash file\n72\nIBM Content Manager OnDemand Guide\nIn XML, the definition and syntax of the markup language are defined in a schema file . For the Content Manager OnDemand XML batch program, the schema file is called ondemand.xsd . It contains the definitions for the Content Manager OnDemand objects: users, groups, applications, application groups, storage sets, folders, printers, and others. Each Content Manager OnDemand object definition contains one or more child objects. For example, a user object has a child object for permissions, and a group object has a child object for users in the group. The schema file ( ondemand.xsd ) must not be changed in any way by the user.\nThe input XML file for the XML batch program is parsed to ensure that it is valid according to the schema file. Each object within the file is examined to ensure that the attributes are valid according to the object type. The XML batch program generates XML when Content Manager OnDemand objects are exported. The XML that is generated can be used as an input for the subsequent arsxml command.\nExample 3-1 shows a sample of the file exportusers.xml from the XML samples directory. You can change the names of the users to the users that you want to export.\nExample 3-1 Sample XML input file for exporting users", - "page_start": 95, - "page_end": 96, - "source_file": "sg246915.pdf" - }, - { - "text": "Acknowledgment\nSpecial thanks to Hassan A Shazly for his effort in bringing this book up to the IBM Content OnDemand Version 9.5 level.\nxvi\nIBM Content Manager OnDemand Guide\nSpecial thanks to the following people for their content contribution:\nBen Boltz is a Senior Software Engineer. He has 32 years of experience in the Software Industry. He has worked on Content Manager OnDemand for Multiplatforms for over 20 years.\nDarrell Bryant joined IBM as a manufacturing engineer and worked as a Systems Engineer who specialized in S/36 and AS/400 systems. In 2000, Darrell joined the OnDemand team. He has performed a mix of activities, including services, education, support, and testing. Darrell is now the lead tester for OnDemand for i. He also develops and teaches workshops to clients and partners. He is the editor of the OnDemand Newsletter.\nNelson Chen is a Software Developer with Content Manager OnDemand. He has over 30 years of experience in software development, among them 27 years at IBM and last 20 years in OnDemand. His areas of expertise include ArsXML, Install, and Configurator.\nTrang Kim Duong is a Software Developer with Content Manager OnDemand. Among her 17 years of experience in software development, the last 11 years were in Content Manager OnDemand. Trang's areas of expertise include workflow for Space Vehicle Design, Content Manager OnDemand Report Distribution, Exporter utility for Content Federation Services for Content Manager OnDemand (CFS-CMOD), and the Content Manager OnDemand back-end database component.\nHubert Hwang is a Software Developer with Content Manager OnDemand. He is a Certified Solutions Expert for Content Manager OnDemand with over 10 years of experience with the product. His areas of expertise include the Content Manager OnDemand Web Enablement Kit Java application programming interfaces (APIs), Content Navigator, and software test automation. He has extensive experience troubleshooting all aspects of the product. He has authored over 200 technotes on topics, such as migration, data collection, and troubleshooting guides, for Content Manager OnDemand.", - "page_start": 17, - "page_end": 18, - "source_file": "sg246915.pdf" - }, - { - "text": "13.1.1 Content Manager OnDemand configuration\nHow reports are defined, indexed, and stored within Content Manager OnDemand greatly influences the speed at which Content Manager OnDemand can retrieve them. Various hints and tips for the optimum way to define reports within Content Manager OnDemand are described in Chapter 3, 'Administration' on page 45.", - "page_start": 321, - "page_end": 321, - "source_file": "sg246915.pdf" - }, - { - "text": "15.4.1 Base configuration in Content Manager OnDemand\nTo enable FTS in Content Manager OnDemand, FTS must be enabled for each of your Content Manager OnDemand instances. In Windows, you enable FTS for each of your Content Manager OnDemand instances in the Content Manager OnDemand Configurator by selecting the Enable Full Text Index and Search check box on the Server (Advanced Options) window.\nOn all other platforms, the ars.cfg file of your Content Manager OnDemand instance must be edited. You must add the following line:\nARS_SUPPORT_FULL_TEXT_INDEX=1\nYou must restart the instance after this configuration to enable the FTS option in the Content Manager OnDemand Administrator. Then, you can configure the FTS options on the application groups and folders.", - "page_start": 365, - "page_end": 366, - "source_file": "sg246915.pdf" - }, - { - "text": "1.3.2 Content Manager OnDemand server components\nA Content Manager OnDemand server environment contains several components:", - "page_start": 34, - "page_end": 34, - "source_file": "sg246915.pdf" - }, - { - "text": "15.1 Introduction to full text search in Content Manager OnDemand\nContent Manager OnDemand users primarily search on the metadata (extracted index values) that is associated with documents. By using FTS, you can intelligently search through actual document content. To enable FTS, the documents are first parsed and an index is built. This index can then be queried by a full text engine.\nThe FTS feature in Content Manager OnDemand comes with a new server, the Full Text Search Server (FTS Server), which handles the text extraction, indexing, and searching of the indexed data. This new server offloads the processing of full text data to a machine other than your Content Manager OnDemand library and object servers.\nThe full text engine is the same search services engine that is used by other IBM products, such as DB2 or IBM FileNet P8. It is based on the Lucene engine and allows advanced and flexible queries. Users can perform wildcard searches, fuzzy (or similar) searches, proximity searches, Boolean searches, and other complex queries.\nThe full text feature can handle many formats, including Microsoft Office documents, XML files, and typical Content Manager OnDemand formats, such as AFP, Line Data, and Adobe Portable Document File (PDF).\nThe FTS feature supports full text indexing of both new and existing data. For new data, the FTS Server is configured to index the newly loaded reports by using the Administrator Client. For existing data, indexing is invoked by using the Content Manager OnDemand command-line utilities or the Content Manager OnDemand Web Enablement Kit (ODWEK) Java application programming interface (API).\nFTS is enabled through the Content Manager OnDemand folder and allows all clients to take advantage of full text queries after the server configuration is complete. Several new Content Manager OnDemand folder field types are defined in support of FTS. Search score, highlight, and summary are returned, aiding the user in determining whether the document is a good match.", - "page_start": 359, - "page_end": 359, - "source_file": "sg246915.pdf" - }, - { - "text": "1.3.2 Content Manager OnDemand server components\n- The IBM OS/390 Indexer is a high-performance indexer that can be used to index various data types and is available on both IBM z/OS and IBM AIXfi.\n- The IBM OS/400 Indexer can be used to index various data types. It is the most common Content Manager OnDemand indexer for IBM i spooled files.\n- The Content Manager OnDemand PDF Indexer can be used to create index data for Adobe Portable Document File (PDF) files.\n- The Content Manager OnDemand Generic Index File Format can be used to provide index data for almost any other type of data, such as HTML documents, word-processing documents, and Tagged Image File Format (TIFF) files.\nChapter 1. Overview and concepts\n11\n12\nIBM Content Manager OnDemand Guide", - "page_start": 34, - "page_end": 35, - "source_file": "sg246915.pdf" - }, - { - "text": "3.1 Report administration\nReport design and definition are key to a successful implementation of a Content Manager OnDemand system. Knowledge of the data that will be indexed, loaded, and retrieved, with knowledge of Content Manager OnDemand preferred practices, results in the most efficient and easy-to-use system possible. In this section, we consider the processes that are followed when you define a Content Manager OnDemand report. We present hints and tips to help in the design and implementation process.\nThe system components that are required for creating, retrieving, and viewing a Content Manager OnDemand report are a storage set, an application group, an application, and a folder. Optionally, cabinets might be used to organize and simplify folder access. These elements, in combination, allow the Content Manager OnDemand administrator to define and create a report definition that can then be used to index and load data into Content Manager OnDemand. Figure 3-1 illustrates the relationship of these elements in a typical Content Manager OnDemand system.\nFigure 3-1 Content Manager OnDemand system components relationship\nTo help you better understand how to perform report administration, we use the example company that is mentioned in 1.2.1, 'Background information of an example company' on page 6 with the Content Manager OnDemand Administrator Client running on Windows to create the required system components. We use the monthly credit card statements that are generated by AFinancial Co in our example. These statements are stored in a single application group in Content Manager OnDemand.", - "page_start": 69, - "page_end": 69, - "source_file": "sg246915.pdf" - }, - { - "text": "5.3.3 Defining a storage set\nIBM Content Manager OnDemand Guide\nFigure 5-14 Relationship between OAM and Content Manager OnDemand", - "page_start": 139, - "page_end": 139, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Considering storage efficiency, should I store my AFP documents as PDF to distribute them over the web ?", - "target_page": 232, - "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "AFP to PDF\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval time. AFP documents are stored more efficiently than PDF documents.\nThe PDF print stream, when it is divided into separate customer statements, is larger than AFP because each statement contains its own set of structures that are required by the PDF architecture to define a document.\nElapsed time and processor time are also essential factors in the decision-making process. The amount of time (elapsed and CPU) that is needed to convert the document depends on how large the document is and how many resources or fonts are associated with the document.\n208\nIBM Content Manager OnDemand Guide", - "page_start": 231, - "page_end": 231, - "source_file": "sg246915.pdf" - }, - { - "text": "7.2 Getting started with PDF indexing\nPDF is a standard that is specified by Adobe Systems, Incorporated, for the electronic distribution of documents. PDF files are compact. They can be distributed globally through email, the web, intranets, or CD-ROM, and viewed with Adobe Reader.\nPDF is a data type or file format that is platform (hardware, operating system)-independent. A PDF file contains a complete PDF document that is composed of text, graphics, and the resources that are referenced by that document.\nTwo PDF file layouts are possible:\n/SM590000 Non-Linear (not 'optimized')\nThis file layout is optimized for space savings. Storing a PDF file by using a Non-Linear layout consumes less disk space than storing the same PDF file linearly. It is slower to access or display this type of layout because portions of the data that is required to assemble pages of the document are scattered throughout the PDF file, so the whole PDF file must be downloaded and accessed before the file can be displayed.\n/SM590000 Linear ('optimized' or 'web optimized')\nIn this file format, the PDF file is created in a linear (in page order) fashion. This file format allows the PDF viewer to start displaying the PDF document pages when they are downloading without waiting for the whole PDF file to be downloaded.\nChapter 7. Indexing and loading\n165", - "page_start": 188, - "page_end": 188, - "source_file": "sg246915.pdf" - }, - { - "text": "Secondary storage of storage volumes\nFor instructions that describe how to handle physical storage volumes and remove them from the library, see the documentation that is provided by the library manufacturer.\nFor instructions about documentation that you might need to complete when you remove storage volumes from a library and where to store them for safekeeping, see your organization's media storage guide.", - "page_start": 257, - "page_end": 257, - "source_file": "sg246915.pdf" - }, - { - "text": "13.4.1 PDF data\nPortable Document Format (PDF) data is an increasingly common data type that can be archived within Content Manager OnDemand. The following key advantages are available by using this data type as a document format:\n/SM590000 It is a read-only format that does not require any external resources, such as images or fonts. It is self-contained.\n/SM590000 The viewer for PDF can be downloaded at no charge from the Adobe website and the browser plug-ins for PDF are also available at no charge.\nDuring PDF document creation, resources, such as images and custom fonts, are placed in the data stream once and then referenced many times from within the PDF file. If a large report is produced from many small documents, that report requires only one copy of the resources.\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the input file. Each of these documents requires a certain number of PDF structures, which define a document. These documents are concatenated together in the .out file, and then loaded into Content Manager OnDemand as separate documents. Because the resources are extracted and placed into a separate resource file, they are not included in each document. For an illustration of the process, see Figure 13-3.\nFigure 13-3 PDF indexing\nIf no resources are collected, the size of the .out file, which contains all of the individual documents, might be larger than the original file. For tips about how to reduce the size of the output file, see 7.3.5, 'PDF indexing: Using internal indexes (Page Piece Dictionary)' on page 173.\n308\nIBM Content Manager OnDemand Guide\nThe size of the input file and the output file can create problems during the load process:\n/SM590000 The temporary space that is used during indexing can be too small and the load fails.\n/SM590000 The maximum input file size that the PDF Indexer can process is 4 GB, but the recommended maximum size for a single document (after indexing) is 50 MB. If this size is exceeded, the system might run out of disk space or memory.", - "page_start": 331, - "page_end": 332, - "source_file": "sg246915.pdf" - }, - { - "text": "7.3.2 Reducing output file size with PDF documents\nWhen you index PDF data, you might be surprised by the size of the output file that the PDF Indexer creates after it indexes the data. In certain cases, the PDF file that is loaded into Content Manager OnDemand is many times larger than the source PDF file.\nWhen the input file is indexed, it is split into multiple PDF documents. Each PDF document contains its own set of PDF structures that are required by the PDF architecture. For this reason, the multiple PDF documents that are created by the indexing can be larger in total than the original PDF document.\nOne way to reduce the size of the output file is using the base 14 fonts.\nChapter 7. Indexing and loading\n167\n168\nIBM Content Manager OnDemand Guide\nIn addition, the following PDF parameter settings can help reduce the size of the output file:\n/SM590000 RESTYPE=ALL\nThe PDF Indexer removes fonts and images from the input file and places them into a separate resource file. Without this option, each PDF document that is created by the indexing contains its own set of duplicate resources. Always use this parameter.\n/SM590000 BOOKMARKS=NO\nIf a PDF document contains bookmarks, each PDF document that is created by the indexing process contains the complete set of bookmarks for the input file. Because the input file is now split into separate documents, most of these bookmarks are invalid. This option prevents the PDF Indexer from copying any bookmarks to the new PDF files.\n/SM590000 REMOVERES=YES\nThis option causes the PDF Indexer to remove unused resources and their supporting structures from the input file before the indexing occurs. Otherwise, the PDF Indexer puts unused resources (with those resources that are used) into the resource file.", - "page_start": 190, - "page_end": 191, - "source_file": "sg246915.pdf" - }, - { - "text": "3.1.1 Storage sets\nWhen you define a report, the first component to create is a storage set if one does not exist. A storage set is a named collection of primary storage nodes that support application groups with similar archive storage management requirements.\n46\nIBM Content Manager OnDemand Guide\nFor example, a storage set can be used to maintain data from different application groups that must retain documents for the same length of time and require the data to be kept on the same type of media. Different storage sets can be created to handle different data retention requirements. One storage set can be set up to maintain data on cache-only storage, and another storage set can be set up to point to an archive storage to maintain data for three years on optical media. Business practices and legal requirements determine the storage management design that is required.\nFor most implementations of Content Manager OnDemand for i, a storage set is created by creating a migration policy.\nFigure 3-2 shows the window where you add a storage set. When you define a storage set, you must specify the report load type. For our example, we create a storage set, StatementStorage. It stores credit card statements from the customers. The load type is Fixed.\nFigure 3-2 Creating a storage set\nFor a more in-depth look into storage management, see Chapter 5, 'Storage management' on page 89.", - "page_start": 69, - "page_end": 70, - "source_file": "sg246915.pdf" - }, - { - "text": "Summary\nAuthors can ensure that their Execl workbooks are accessible to people with disabilities even when distributing them in PDF format using the following approach:\n1. First, they should follow the practices in Accessibility best practices with Excel spreadsheets .\n2. Next, they should follow the steps in Create accessible PDFs to preserve the accessibility of the workbook in PDF format.\nThis article provides details about the information Excel includes in the PDF to make it accessible.\n1. PDF/UA tags are included to provide semantic information about the content in the document.\n2. Decorative content does not need to be read, so it is marked as in the Content Tree in the PDF and no PDF/UA tags are included.", - "page_start": 44, - "page_end": 44, - "source_file": "office-pdf.pdf" - }, - { - "text": "7.2.1 Limitations\nThe maximum input file size that is supported by PDF Indexer is 4 GB. The amount of data that can be processed from an input file is also limited by the amount of memory that is available on the server on which you are running the PDF Indexer. The maximum size of a single document within the input file that can be loaded into Content Manager OnDemand is 2 GB; however, we suggest that the size of a single PDF document does not exceed 50 MB.\nSecure PDF documents are not supported. PDF Digital Signatures are not supported. If a PDF document contains a digital signature, after indexing, the .out file does not contain the digital signature. To load a file that contains a PDF Digital Signature, create a generic index file for it, and load the file as one document.", - "page_start": 189, - "page_end": 189, - "source_file": "sg246915.pdf" - }, - { - "text": "Storage Management\nThe Storage Management setting determines how long report data and indexes are kept in cache storage before they are expired. Options determine how soon data is migrated to archive storage after the report load completes.\nFor a detailed description of the storage management options, see Chapter 5, 'Storage management' on page 89.\nChapter 3. Administration\n49\n50\nIBM Content Manager OnDemand Guide", - "page_start": 72, - "page_end": 73, - "source_file": "sg246915.pdf" - }, - { - "text": "10.2 Loading and storing the data\nThe storage set must support the number of days that you plan to maintain reports in the application group. For example, if you must maintain reports in archive storage for seven years, the storage set must identify a storage node (or migration policy on an IBM i server) that is maintained by ASM for seven years.\nA detailed description of adding storage sets and storage nodes is in Chapter 5, 'Storage management' on page 89 and the related OnDemand Administrative Guide.", - "page_start": 244, - "page_end": 244, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "Where can I consult a summary of the impact of the International tax compliance regulations ?", - "target_page": 3, - "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThe Regulations amend the International Tax Compliance Regulations 2015 ('the principal Regulations') which give effect to agreements and arrangements reached between the United Kingdom and other jurisdictions to improve international tax compliance.\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into by the United Kingdom for the exchange of financial account information with other jurisdictions up to 19th April 2020, the date before the Regulations are made.\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation 2(4)(b) amends the definitions of 'new account' and 'pre-existing account' in relation to those\n( a ) 'Financial account' and 'reporting financial institution' are defined in the table in regulation 24(2) of the principal Regulations.\n( b ) 'The DAC' is defined in regulation 1(3)(a) of the principal Regulations.\n2\naccounts so that these terms are defined by reference to the date that those accounts ceased to be excluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts which were previously excluded accounts.\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-theuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the impacts that apply to this instrument.\n' Crown copyright 2020\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nUK202004201005 04/2020 19585\nhttp://www.legislation.gov.uk/id/uksi/2020/438", - "page_start": 1, - "page_end": 3, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations make amendments to secondary legislation relating to special educational needs and disability in order to provide exceptions to time limits set out in that legislation where they cannot be met because of a reason relating to the incidence or transmission of coronavirus.\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review the effectiveness of the Regulations during the period in which they have effect. The Regulations cease to have effect on 25th September 2020.\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 ('the SEND Regulations 2014').\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain requirements in those Regulations for actions to be taken within specified time limits where it is not reasonably practicable for a person to meet those requirements for a reason relating to the incidence or transmission of coronavirus. Instead, any such requirement is to be read as a requirement for such action to be taken as soon as reasonably practicable.\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 ('the Personal Budgets Regulations 2014').\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as regulation 5 does in respect of the SEND Regulations 2014.\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) Regulations 2015 ('the Detained Persons Regulations 2015').\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to the ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal Budgets Regulations 2014 respectively.\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax time limits.\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017 ('the First-tier Tribunal Regulations 2017').\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to those in regulations 5, 17 and 20.\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency measure and no significant impact on business, charities or voluntary bodies is foreseen.\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n' Crown copyright 2020", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendments to the International Tax Compliance Regulations 2015\n2. -(1) The International Tax Compliance Regulations 2015( b ) are amended as follows.\n(2) In regulation 1(3)(b)(i), for '16th May 2019' substitute '19th April 2020'( c ).\n(3) In regulation 3(4A)(a), at the beginning insert 'subject to regulation 24(3)'.\n(4) In regulation 24-\n(a) in the table in paragraph (2), in the column headed 'the CRS'-\n(i) at the beginning of the entry for 'new account' insert 'subject to paragraph (3)', and\n(ii) at the beginning of the entry for 'pre-existing account' insert 'subject to regulation 3(4A)(a) and paragraph (3)', and\n(b) after paragraph (2) insert-\n'(3) In respect of the accounts listed in paragraph (4)-\n( a ) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not relevant to these Regulations.\n( b ) S.I. 2015/878 (referred to in these footnotes as 'the principal Regulations'); relevant amending instruments are S.I. 2017/598, 2018/490 and 2019/881.\n( c ) In accordance with the common reporting standard for automatic exchange of financial account information developed by the Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom exchanges information received from financial institutions under the principal Regulations with a territory which is a 'Reportable Jurisdiction' under the CRS and with which the United Kingdom has entered into international exchange arrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrcinternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at the offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "Citation and commencement\n1. These Regulations may be cited as the International Tax Compliance (Amendment) Regulations 2020 and come into force on 13th May 2020.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "Compliance with IFRS\nThe financial statements comply with International Financial Reporting Standards (IFRS) adopted by the International Accounting Standards Board (IASB).", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "(A) Statement of Compliance\nThese consolidated financial statements have been prepared in accordance with International Financial Reporting Standards ('IFRS') as issued by the International Accounting Standards Board ('IASB').", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Consequential Amendments\n1. -(1) The Health Protection (Notification) Regulations 2010( a ) are amended as follows.\n(2) In regulation 4(3D)(b), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n( a ) S.I. 2010/659. Regulations 4(3D) and 4ZA were inserted by S.I. 2021/150. There are other amendments but none is relevant.\n88", - "page_start": 87, - "page_end": 87, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Transitional provision\n1. Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to regulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations') in advance of arrival in England is treated as passenger information provided for the purposes of these Regulations where the person arrives in England on or after that date.\n2. Confirmation given by the Foreign, Commonwealth and Development Office that a person is not required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that the person is not required to comply with regulation 6 of these Regulations where the person arrives in England on or after 4.00 a.m. on 17th May 2021.\n3. A designation by the Secretary of State of a person as an authorised person under regulation 5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person under of regulation 11(11)(c) of these Regulations.\n4. Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who exercises the powers in that regulation in relation to a person who arrived in England before 4.00 a.m. on 17th May 2021.\n( a ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.\n89", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "6.1 Foundation, legislation, compliance and supervision\n'However, the collected data shows that overall compliance with the OSH acquis across the EU and across establishment sizes is moderate to good. There is no indication that compliance is measurably higher in the public sector compared to the private sector. Yet, in reality, compliance varies significantly from directive to directive, from MS to MS and across establishment sizes.\nMicro establishments: Cannot be assessed (limited evidence points to poor overall quantitative compliance)\n· 10 to 19 employees: Poor overall quantitative compliance\n· 20 to 49 employees: Moderate overall quantitative compliance\n· 50 to 249 employees: Good overall quantitative compliance\n· 250 to 499 employees: Good overall quantitative compliance\n· 500+ employees: Very good overall quantitative compliance'. 354\nIn 2018, DG EMPL organised a peer review on 'The efficient transposition, implementation and enforcement of EU OSH legislation' for each EU Member State. 355 The overall conclusion is positive but refers to the difference between formal (paper) compliance and 'real improvements' :\n'Although not uniform across employers (with evidence that smaller businesses in particular find some of the demands challenging and difficult to implement) indications are also that the transposed legislation is being implemented within workplaces. However, there are indications that the fact of implementation is not necessarily a true indicator of the quality of that action, with suggestions that 'compliance' is to some extent a paper exercise and is not always reflected in real improvements in working environments.'\nThe authors of EU-OSHA's 'Supporting compliance' report 356 note the same difference, using the terms 'substantive' versus 'rule compliance' . 357 This report and underlying literature review have specifically analysed reasons and context for compliance and non-compliance. They analysed the influence of:\n· social norms and social reporting strategies, and corporate social responsibility;\n· economic incentives and the business case for OSH;\n· the role of supply chain relations in supporting OSH;\n· prevention services; and\n· strategies and practices adopted by OSH regulators.", - "page_start": 121, - "page_end": 121, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "What was the muscle volume of the knee flexors of the 2024 word's strongest man ?", - "target_page": 7, - "target_passage": "Knee flexors 3,060 ", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n3.WSM = . , Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 401±76. , Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = . , Muscle Volume, cm 3.Untrained ( n 5 11) = 326±93", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\nfasciae latae, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 86±25. Tensor fasciae latae, Muscle Volume, cm 3.Untrained ( n 5 11) = 73±24. Adductor magnus, Muscle Volume, cm 3.WSM = 1,334. Adductor magnus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,056 ± 83. Adductor magnus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 828±128. Adductor magnus, Muscle Volume, cm 3.Untrained ( n 5 11) = 624±81. Gracilis, Muscle Volume, cm 3.WSM = 235. Gracilis, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 180±37. Gracilis, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 142 ± 37. Gracilis, Muscle Volume, cm 3.Untrained ( n 5 11) = 98±23. Gluteus maximus, Muscle Volume, cm 3.WSM = 1,980. Gluteus maximus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,797 ± 376. Gluteus maximus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 1,257 ± 197. Gluteus maximus, Muscle Volume, cm 3.Untrained ( n 5 11) = 931 ± 108. Gluteus medius and minimus, Muscle Volume, cm 3.WSM = 1,172. Gluteus medius and minimus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 626±129. Gluteus medius and minimus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 575±97. Gluteus medius and minimus, Muscle Volume, cm 3.Untrained ( n 5", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n3.WSM = 4,386. Knee extensors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 3,218 ± 400. Knee extensors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 2,636±401. Knee extensors, Muscle Volume, cm 3.Untrained ( n 5 11) = 2,202±315. Plantar /uniFB02 exors, Muscle Volume, cm 3.WSM = 1,888. Plantar /uniFB02 exors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,112 ± 181. Plantar /uniFB02 exors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 943±156. Plantar /uniFB02 exors, Muscle Volume, cm 3.Untrained ( n 5 11) = 860±172. Iliopsoas, Muscle Volume, cm 3.WSM = 681. Iliopsoas, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 702±97. Iliopsoas, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 618±101. Iliopsoas, Muscle Volume, cm 3.Untrained ( n 5 11) = 514 ± 75. Sartorius, Muscle Volume, cm 3.WSM = 429. Sartorius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 306±46. Sartorius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 209±50. Sartorius, Muscle Volume, cm 3.Untrained ( n 5 11) = 142 ± 25. Tensor fasciae latae, Muscle Volume, cm 3.WSM = 142. Tensor fasciae latae, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 135 ± 41. Tensor", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n11) = 583±76. Rectus femoris, Muscle Volume, cm 3.WSM = 453. Rectus femoris, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 476±45. Rectus femoris, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 401±78. Rectus femoris, Muscle Volume, cm 3.Untrained ( n 5 11) = 303±55. Vastus lateralis, Muscle Volume, cm 3.WSM = 1,508. Vastus lateralis, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,132 ± 180. Vastus lateralis, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 925±156. Vastus lateralis, Muscle Volume, cm 3.Untrained ( n 5 11) = 743±98. Vastus intermedius, Muscle Volume, cm 3.WSM = 1,336. Vastus intermedius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 962±145. Vastus intermedius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 789±140. Vastus intermedius, Muscle Volume, cm 3.Untrained ( n 5 11) = 680±115. Vastus medialis, Muscle Volume, cm 3.WSM = 1,088. Vastus medialis, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 649±97. Vastus medialis, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 521±79. Vastus medialis, Muscle Volume, cm 3.Untrained ( n 5 11) = 476±111. Semimembranosus, Muscle Volume, cm 3.WSM = 392. Semimembranosus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 359±60.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n310. Lateral gastrocnemius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 202±34. Lateral gastrocnemius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 170 ± 37. Lateral gastrocnemius, Muscle Volume, cm 3.Untrained ( n 5 11) = . Medial gastrocnemius, Muscle Volume, cm 3.WSM = 515. Medial gastrocnemius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 300±38. Medial gastrocnemius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 262±58. Medial gastrocnemius, Muscle Volume, cm 3.Untrained ( n 5 11) = 251 ± 52. Soleus, Muscle Volume, cm 3.WSM = 1,063. Soleus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 610±137. Soleus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 510±76. Soleus, Muscle Volume, cm 3.Untrained ( n 5 11) = 453±95. Anterior compartment Lateral compartment, Muscle Volume, cm 3.WSM = 445 253. Anterior compartment Lateral compartment, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 302±59 147 ± 32. Anterior compartment Lateral compartment, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 273±47 161 ± 42. Anterior compartment Lateral compartment, Muscle Volume, cm 3.Untrained ( n 5 11) = 291 ± 47. Posterior compartment, Muscle Volume, cm 3.WSM = 406. Posterior compartment, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = . Posterior compartment, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 345±71. Posterior compartment, Muscle Volume, cm 3.Untrained ( n 5 11) = 153 ± 35. , Muscle Volume, cm", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\nSemimembranosus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 327±59. Semimembranosus, Muscle Volume, cm 3.Untrained ( n 5 11) = 262±18. Semitendinosus, Muscle Volume, cm 3.WSM = 563. Semitendinosus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 449±70. Semitendinosus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 350±79. Semitendinosus, Muscle Volume, cm 3.Untrained ( n 5 11) = 219 ± 39. Biceps femoris long head, Muscle Volume, cm 3.WSM = 454. Biceps femoris long head, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 340±31. Biceps femoris long head, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 267±47. Biceps femoris long head, Muscle Volume, cm 3.Untrained ( n 5 11) = 221±42. Biceps femoris short head, Muscle Volume, cm 3.WSM = 135. Biceps femoris short head, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 167 ± 26. Biceps femoris short head, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 131 ± 34. Biceps femoris short head, Muscle Volume, cm 3.Untrained ( n 5 11) = 110 ± 28. Popliteus, Muscle Volume, cm 3.WSM = 27. Popliteus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 23±5. Popliteus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 17 ± 5. Popliteus, Muscle Volume, cm 3.Untrained ( n 5 11) = 19 ± 6 156±41. Lateral gastrocnemius, Muscle Volume, cm 3.WSM =", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nOverall quadriceps femoris volume of the WSM (4,386 cm 3 ) was 127% greater than a large, pooled population of untrained controls (1,932 ± 336; n ¼ 102), 66% greater than subelite sprinters (2,636 ± 401 cm 3 ), 53% greater than long-term resistancetrained individuals (2,876 ± 311 cm 3 ), and 36% greater than elite\n794\nJ Appl Physiol /C15 doi:10.1152/japplphysiol.00342.2024 /C15 www.jappl.org\nDownloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\nFigure 3. Percentage differences in muscle volumes of all muscles, 5 functional muscle groups, and 23 individual muscles/compartments between the World ' s Strongest Man and deadlift champion (WSM; n ¼ 1) and untrained control participants ( n ¼ 11) from the work by Miller et al. (13). A positive value indicates greater muscle volume of WSM relative to the group mean of the untrained controls. The functional muscle groups and individual muscles are ordered according to the magnitude of the percentage differences for absolute muscle volume.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\nAll muscles, Muscle Volume, cm 3.WSM = 14,922. All muscles, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 11,323 ± 1,328. All muscles, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 9,164 ± 1,207. All muscles, Muscle Volume, cm 3.Untrained ( n 5 11) = 7,628 ± 1,548. Hip /uniFB02 exors, Muscle Volume, cm 3.WSM = 1,704. Hip /uniFB02 exors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,620 ± 200. Hip /uniFB02 exors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 1,314 ± 216. Hip /uniFB02 exors, Muscle Volume, cm 3.Untrained ( n 5 11) = 1,031 ± 151. Hip extensors, Muscle Volume, cm 3.WSM = 4,724. Hip extensors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 4,002±489. Hip extensors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 3,029±422. Hip extensors, Muscle Volume, cm 3.Untrained ( n 5 11) = 2,257 ± 220. Knee /uniFB02 exors, Muscle Volume, cm 3.WSM = 3,060. Knee /uniFB02 exors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 2,304 ± 178. Knee /uniFB02 exors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 1,859 ± 301. Knee /uniFB02 exors, Muscle Volume, cm 3.Untrained ( n 5 11) = 1,460 ± 196. Knee extensors, Muscle Volume, cm", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Conclusions\nIn conclusion, this novel investigation documented the muscle and tendon morphology and whole body strength and power characteristics of an exceptionally strong individual, relative to comparative athletic, trained, and untrained\n798\npopulations. Overall leg muscle volume of the WSM was approximately twice that of untrained controls but with pronounced anatomical variability in the extent of muscular development. The plantar /uniFB02 exor muscle group and the guy rope muscles (sartorius, gracilis, and semitendinosus: þ 140 to þ 202%), which stabilize the pelvis and femur, demonstrated the largest differences. The pronounced quadriceps femoris size of the WSM (greater than or equal to twice that of untrained) was accompanied by a more modest difference in patella tendon moment arm ( þ 18%) and was not matched by a proportional difference in tendon size ( þ 30%).", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "DISCUSSION\nThis study is the /uniFB01 rst to document the lower-body muscle and tendon morphology of a World ' s Strongest Man and deadlift champion (i.e., an exceptionally strong individual), and these are presented alongside functional whole body assessments, which exceeded the highest IMTP force (gross\nand net) and CMJ power values previously reported by 54%, 100%, and 164%, respectively. The WSM had overall lowerbodymuscularityapproximatelytwicethatofuntrainedcontrols ( þ 96%) and 32% greater than that of elite 100-m sprinters. However, there was substantial anatomical variability in the magnitude of the differences, ranging from the plantar /uniFB02 exors ( þ 120% vs. untrained) to the hip /uniFB02 exors ( þ 65% vs. untrained). Similarly, some speci /uniFB01 c muscles, such as the guy rope muscles that stabilize the femur and pelvis, were 2.5 -3.0 times the volume of untrained individuals (gracilis þ 140%, semitendinosus þ 157%, and sartorius þ 202%) but others displayed more marginal differences (BFsh þ 23%, iliopsoas þ 32% vs. untrained). Considering the knee extensors, the WSM had both quadriceps femoris volume greater than or equal to twofold that of untrained controls and a greater patella tendon moment arm than we have previously measured ( þ 18% vs. untrained), which would be expected to combine to facilitate extraordinary strength. Furthermore, despite the WSM ' sextremelylargequadricepsfemoris,theirpatellartendonCSAwasonly30%greaterthanthatofuntrainedcontrols and not outside the range of tendons we have previously assessed. The results of this study provide novel insights into the muscle and tendon characteristics, as well as the strength and power capabilities, of an extraordinarily strong individual that may be toward the upper limit of human variation in these characteristics.\nJ Appl Physiol /C15 doi:10.1152/japplphysiol.00342.2024 /C15 www.jappl.org\n795", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "What are the nutritionnal added components to the word's strongest man regime ?", - "target_page": 2, - "target_passage": "The WSM’s nutritional supplement consumption included protein, branched-chain amino acids, and electrolytes", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Participant\nThe WSM ' s achievements included one World ' sStrongest Man title (14 mo prior to measurement), /uniFB01 ve Britain ' s Strongest Man titles (the most recent 6 mo prior to measurement), twice being World Deadlift Champion and Deadlift WorldRecordholder(500kg;atthetimeofmeasurement), and second place at Europe ' s Strongest Man. Prior to agreeing to participate, the purpose of the research study and the testing procedures were explained to the participant along with the risks and bene /uniFB01 ts of taking part. The participant gave his written informed consent to participate in the study that was approved by the Loughborough University Ethical Advisory Committee (Ethics Number R18-P090). Included in the written consent was a statement providing permission for publication of the collected data and the likelihood that their identity may be evident based on their achievements and characteristics, despite anonymization.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nTable 1. Descriptive characteristics of a World ' s Strongest Man and deadlift champion and populations featured within this study for the purposes of providing comparative muscle and tendon morphology data\nWSM, n = 1. WSM, Age, yr = 30.6. WSM, Height, m = 1.90. WSM, Body Mass, kg = 172.0. WSM, Source of Comparative Data = . Overall muscle morphology, n = . Overall muscle morphology, Age, yr = . Overall muscle morphology, Height, m = . Overall muscle morphology, Body Mass, kg = . Overall muscle morphology, Source of Comparative Data = . Elite sprint runners, n = 5. Elite sprint runners, Age, yr = 27.4 ± 4.1. Elite sprint runners, Height, m = 1.83 ± 0.06. Elite sprint runners, Body Mass, kg = 86.4 ± 6.7. Elite sprint runners, Source of Comparative Data = Miller et al. (13). Subelite sprint runners, n = 26. Subelite sprint runners, Age, yr = 22.0 ± 2.2. Subelite sprint runners, Height, m = 1.78 ± 0.06. Subelite sprint runners, Body Mass, kg = 75.4 ± 7.3. Subelite sprint runners, Source of Comparative Data = . Untrained controls, n = 11. Untrained controls, Age, yr = 25.8 ± 2.6. Untrained controls, Height, m = 1.80 ± 0.08. Untrained controls, Body Mass, kg = 75.2 ± 5.6. Untrained controls, Source of Comparative Data = . Quadriceps femoris muscle morphology, n = . Quadriceps femoris muscle morphology, Age, yr = . Quadriceps femoris muscle morphology, Height, m = . Quadriceps femoris muscle morphology, Body Mass, kg = . Quadriceps femoris muscle morphology, Source of Comparative Data = . Long-term resistance-trained, n = 16. Long-term resistance-trained, Age, yr = 22±2. Long-term resistance-trained, Height, m = 1.83 ± 0.06. Long-term resistance-trained, Body Mass, kg = 91 ± 10. Long-term resistance-trained, Source of Comparative Data", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" - }, - { - "text": "1.2 Reference Documents\nTable 1-1: Reference Documents\n[1], Reference = EDP_S1_MAN. [1], Title = EDP_S1_MAN_Portal-Version1-UserManual_v1.0. [1], Version = 1.0. [2], Reference = EDP_S1_MAN. [2], Title = EDP_S1_MAN_Portal-Version1.3-UserManual_v1.2. [2], Version = 1.3. [3], Reference = EDP_S1_MAN. [3], Title = EDP_S1_MAN_Portal-Version2.0-UserManual_v1.0. [3], Version = 2.0. [4], Reference = EDP_S1_MAN. [4], Title = EDP_S1_MAN_Portal-Version3.0-UserManual_v1.0. [4], Version = 3.0", - "page_start": 3, - "page_end": 3, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "INTRODUCTION\npredictions of skeletal muscle mass nor dual-energy X-ray absorptiometry provides detailed information on the size of speci /uniFB01 c individual muscles. Given the known importance of muscle size as a determinant of muscular strength (9 -11), pronounced muscle size seems likely to be critical to extreme human strength; however, the speci /uniFB01 c muscle size of extremely strong individuals remains unknown. Similarly, a large moment arm (e.g., of the patella tendon at the knee joint) could contribute to the expression of high muscular strength (10, 12), and a large tendon may mitigate the mechanical stress it experiences with very high muscular loads, and therefore, these characteristics may also be expected in individuals selected for exceptional strength.\nIn this paper, we present the /uniFB01 ndings from a unique opportunity to examine the laboratory function, muscle size, and distribution of muscle mass, as well as patellar tendon size and moment arm, of a World ' s Strongest Man and deadlift champion (WSM) in comparison with existing data on untrained individuals, power athletes (100-m-track sprinters), and long-term resistance-trained populations that we have assessed previously (10, 11, 13 -15).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "INTRODUCTION\nFeats of strength have fascinated man since the early stages of human civilization, as shown by the archeological evidence of inscribed heavy stones at Olympia and Thera in Greece, dated to the 6th century BC, detailing the way they were lifted by Bybon and Eumastus, respectively (1). Over the centuries, many types of strength competitions have existed; some of which have been codi /uniFB01 ed and endured within modern sporting competitions (e.g., weightlifting, powerlifting, and shot put).Inaddition,professionalstrongmancompetitions,such as the annually contested ' World ' s Strongest Man ' event, generate extensive global interest (2). Moreover, scienti /uniFB01 c understanding of muscular strength is important because of its role in athletic performance (3), injury prevention (4), and\nhealthy aging (5). However, our knowledge of extreme human strength is limited.\nTo date, there is little scienti /uniFB01 c information on the characteristics of extremely strong humans in terms of laboratorybased tests of strength and power, particularly the size and distribution of their muscle mass, as well as tendon size and joint mechanics (moment arm). Kraemer et al. (6)examinedthe body composition of elite strongman competitors using dualenergy X-ray absorptiometry scanning and found that they had a body mass (153±19 kg) and lean mass (118±12 kg) approximately twice that of an average untrained healthy young man. Whole body skeletal muscle mass of athletes from strength- and power-based sports has also been estimated using ultrasound measurements at a limited number of anatomical locations (7, 8). However, neither ultrasound-derived\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). Submitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024\nwww.jappl.org\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0.\nPublished by the American Physiological Society. Downloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\n789\nWORLD STRONGMAN AND DEADLIFT CHAMPION", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nTable 1. Descriptive characteristics of a World ' s Strongest Man and deadlift champion and populations featured within this study for the purposes of providing comparative muscle and tendon morphology data\nyr = 22±2. Long-term resistance-trained, Height, m = 1.83 ± 0.06. Long-term resistance-trained, Body Mass, kg = 90±10. Long-term resistance-trained, Source of Comparative Data = Massey et al. (15). Untrained controls, n = 39. Untrained controls, Age, yr = 25±2. Untrained controls, Height, m = 1.76 ± 0.06. Untrained controls, Body Mass, kg = 72±9. Untrained controls, Source of Comparative Data = ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" - }, - { - "text": "Abstract\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World ' s Strongest Man and deadlift champion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the extent of muscular development ( þ 23 -202%): the plantar /uniFB02 exor group and guy rope muscles demonstrating the largest differences. The WSM ' s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella tendon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%).\nisometric force; magnetic resonance imaging; power; strength", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "Limitations\nACSA-muscle length curve: (10, 11, 14) vs. the equation detailed earlier: WSM and (13)]; and 4 )theuseofunilateralMRImeasuresderived from one limb (10, 11, 14, 15) or collapsed across two limbs [WSM and (13)]. However, it seems likely that these subtle differences would have had at most a very minor effect on the /uniFB01 ndings.Finally,itisalsoimportanttohighlightthatthedifferences documented between the WSM and comparative populations for the various measures included in the current study cannot be assumed to be anything other than a combination of both innate (genetic) and environmental (training and nutrition) factors.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "REFERENCES\n1. Crowther NB. Weightlifting in antiquity: achievement and training. Greece Rome 24: 111 -120, 1977. doi:10.1017/s0017383500018416.\n2. Dixon E. How Wave.tv is making the World ' s Strongest Man think bigger with its digital plans (Online). SportsPro, 2020.https://www. sportspromedia.com/insights/analysis/worlds-strongest-man-wavetvthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024].\n3. Suchomel TJ , Nimphius S , Stone MH. The importance of muscular strength in athletic performance. Sports Med 46: 1419 -1449, 2016. doi:10.1007/s40279-016-0486-0.\n4. Opar DA , Williams MD , Timmins RG , Hickey J , Duhig SJ , Shield AJ. Eccentric hamstring strength and hamstring injury risk in Australian footballers. Med Sci Sports Exerc 47: 857 -865, 2015. doi:10.1249/ mss.0000000000000465.\n5. McLeod M , Breen L , Hamilton DL , Philp A. Live strong and prosper: the importance of skeletal muscle strength for healthy ageing. Biogerontology 17: 497 -510, 2016. doi:10.1007/s10522-015-9631-7.\n6. Kraemer WJ , Caldwell LK , Post EM , DuPont WH , Martini ER , Ratamess NA , Szivak TK , Shurley JP , Beeler MK , Volek JS , Maresh CM , Todd JS , Walrod BJ , Hyde PN , Fairman C , Best TM. Body composition in elite strongman competitors. JStrengthCondRes 34: 3326 -3330, 2020. doi:10.1519/jsc.0000000000003763.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n3.WSM = . , Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 401±76. , Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = . , Muscle Volume, cm 3.Untrained ( n 5 11) = 326±93", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "Why constraint made the scanning of the word's strongest man's upper body impossible using a MRI ?", - "target_page": 10, - "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Limitations\nAlthough the current investigation provides a detailed assessment of an individual at/toward the upper limit of human strength performance, it is important to appreciate study limitations. First, the participant was not measured immediately before their World ' sStrongestManchampionship success or other landmark performances, and it is entirely possible the functional and structural characteristics we assessed mayhavebeenevenhigherdirectlypriortopeakperformances. Despite using a wide-bore MRI scanner, due to the size of the WSM ' s shoulders and arms, it was not possible to scan their upperbody.Thus,wewerenotabletoinvestigatethisaspectof the WSM ' s muscle morphology; although given that greater hypertrophy occurs in the upper body compared with the lower body (42), it is possible that the WSM ' s upper-body muscle size relative to untrained controls may have been even more pronounced than what we have documented for the lower body. In the current study to provide the most representative data on untrained control participants, the largest available untrained control populations were used for each category of measurements. Thus, different untrained control populations were used [e.g., comparison of quadricep and hamstring size ( n ¼ 102) vs. comparison of all the leg muscles ( n ¼ 11)], which led to some subtle discrepancies in the contrasts between these groups and the WSM [e.g., quadriceps femoris/knee extensors, þ 127% and þ 99% relative to our large pooled ( n ¼ 102) and smaller ( n ¼ 11) untrained control samples, respectively]. Importantly, however, this discrepancy does not appear to meaningfully affect the interpretation of the /uniFB01 ndings. There were subtle differences in the precise scanning and analysis approaches used with the reference populations featured in this study, including 1 )magnetic /uniFB01 eld strength [1.5 T (10, 11, 15) vs. 3.0 T, WSM and (13, 14)]; 2 ) the interslice distance used to quantify quadriceps femoris and hamstrings muscle volume [1.5 cm (10, 11, 14)vs.2.0cm,WSMand(13)]; 3 )thecalculation of muscle volume [area under the cubic spline", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nThe participant reported for their MRI scan [3.0-T Discovery MR750W (70-cm-wide bore), GE Medical] having not completed any strenuous physical activity in /C21 24 h and had received prior instruction to arrive in a relaxed state having eaten and drunk normally. The participant sat quietly for 15 min prior to their scan. The participant lay supine for the MRI scan of the lower-body musculature from T12 to the lateral malleolus. A body coil (GE Medical) allowed axial T1weighted images (time of repetition/time to echo 600/8.144 ms, image matrix 512 /C2 512, /uniFB01 eld of view 500 /C2 500 mm, pixel size 0.9766 /C2 0.9766 mm, slice thickness 5 mm, and interslice gap 5 mm) to be acquired in /uniFB01 ve overlapping blocks. Images of both sides of the body were acquired within a single scan for blocks 1 (T12 to pelvis), 4 (knee joint space to midshank), and 5 (midshank to lateral malleolus). However, due to the size of the participant ' s thighs, it was necessary to scan each thigh individually for blocks 2 (pelvis to midthigh) and 3 (midthigh to knee joint space); this involved the radiographer repositioning the /uniFB01 eld of view between scanning the /uniFB01 rst and the second thigh but not physically moving the coil or the participant. Oil/uniFB01 lled capsules were secured to the surface of the participant ' sskin with Transpore tape at intervals along the length of the lower body prior to the scan and in an of /uniFB02 ine analysis used to verify the alignment of the blocks (Horos software, Version 3.36, https://horosproject.org/).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "Study design\nThe participant underwent 26 MRI scanning sessions from 3 weeks before conception through 2 years postpartum (162 weeks), during which high-resolution anatomical and diffusion spectrum imaging scans of the brain were acquired. Scans were distributed throughout this period, including prepregnancy (four scans), first trimester (four scans), second trimester (six scans), third trimester (five scans) and postpartum (seven scans; Fig. 1c). The first 6 sessions took place at the UCSB Brain Imaging Center (BIC), the final 20 sessions took place at the UCI Facility for Imaging and Brain Research (FIBRE). The majority of scans took place between 9 AM and 2 PM, limiting significant AM-PM fluctuations 49 . The MRI protocol, scanner (Siemens 3T Prisma) and software (version MR E11) were identical across sites. Each scanner was checked weekly for the duration of the study and passed all QC reports indicating no significant alterations in the geometry. To ensure the robustness of the findings, after the final study session, the participant completed back-to-back validation scans at UCI and UCSB within a 12-h window to assess reliability between scanners. Intraclass correlation coefficients (two-way, random effects, absolute agreement, single rater) reveal 'excellent' test-retest reliability between scanners, including ROI-level GMV (ICC = 0.97, 95% CI: 0.80-0.99), ROI-level CT (ICC = 0.96, 95% CI: 0.90-0.98), MTL subfield volume (ICC = 0.99, 95% CI: 0.97-0.99) and ROI-level QA (ICC = 0.94, 95% CI: 0.91-0.97). Furthermore, when examining the relationship between gestation week and GMV among UCI-only gestational sessions, findings were consistent (Supplementary Fig. 12), indicating that site differences are highly unlikely to have contributed meaningfully to the observed effects. Although not applicable here, we note that having a control participant scanned over a similar duration within the same scanner is critical for estimating how much variation in the brain can be attributed to within-scanner variability.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "Endocrine procedures\nMRI acquisition . MRI scanning sessions at the University of California, Santa Barbara and Irvine were conducted on 3T Prisma scanners equipped with 64-channel phased-array head/neck coil (of which 50 coils are used for axial brain imaging). High-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms, time to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms, TE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w) turbo spin echo scan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus (TR/ TE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm 2 in-plane resolution, 2-mm slice thickness, 38 interleaved slices with no gap, total acquisition time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI) protocol sampled the entire brain with the following parameters: single phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions, b -max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm voxel resolution. These images were linearly registered to the whole-brain T1w MPRAGE image. A custom foam headcase was used to provide extra padding around the head and neck, as well as to minimize head motion. Additionally, a custom-built sound-absorbing foam girdle was placed around the participant's waist to attenuate sound near the fetus during second-trimester and third-trimester scanning.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "Abstract\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World ' s Strongest Man and deadlift champion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the extent of muscular development ( þ 23 -202%): the plantar /uniFB02 exor group and guy rope muscles demonstrating the largest differences. The WSM ' s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella tendon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%).\nisometric force; magnetic resonance imaging; power; strength", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "Endocrine procedures\nlabel fusion 69 . Finally, the corrective learning classifiers contained in ASHS were applied to the consensus segmentation produced by joint label fusion. The output of this step is a corrected segmentation of the T2w scan. Further description of the ASHS protocol can be found here 67 . T2w scans and segmentations were first visually examined using ITK-SNAP 70 for quality assurance and then subjected to manual editing in native space using ITK-SNAP (v.3.8.0-b; C.M.T.). One session (scan 15, third trimester) was discarded due to erroneous scan orientation. The anterior extent of the segmented labels was anchored 4 mm (two slices) anterior to the appearance of the limen insulae, and the posterior extent was anchored to the disappearance of hippocampal gray matter from the trigone of the lateral ventricle. Boundaries between perirhinal, entorhinal and parahippocampal cortices were established in keeping with the Olsen-Amaral-Palombo (OAP) segmentation protocol 71 . In instances where automatic segmentation did not clearly correspond to the underlying neuroanatomy, such as when a certain label was missing several gray matter voxels, manual retouching allowed for individual voxels to be added or removed. All results are reported using the manually retouched subregion volumes to ensure the most faithful representation of the underlying neuroanatomy. Scans were randomized and segmentation was performed in a random order, blind to pregnancy stage. To assess intrarater reliability for the present analyses, two days underwent manual editing a second time. The generalized Dice similarity coefficient 72 across subregions was 0.87 and the intraclass correlation coefficient was 0.97, suggesting robust reliability in segmentation.\nWhite matter microstructure . Diffusion scans were preprocessed using the automation software QSIprep (version 0.16.1) compiled using a singularity container 73 and run primarily with the default parameters, with the exceptions '-output resolution 1.8', '-dwi denoise window 5', -force-spatial-normalization', '-hmc model 3dSHORE',", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" - }, - { - "text": "Acquisition\nImaging type(s)\nStructural\nField strength\n3\nSequence & imaging parameters\nHigh-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo (MPRAGE) sequence (TR = 2500 ms, TE = 2.31 ms, T1 = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient echo fieldmap (TR = 758 ms; TE1 = 4.92 ms; TE2 = 7.38 ms; flip angle = 60°). A T2-weighted (T2w) turbo spin echo (TSE) scan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus (TR/TE = 9860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, 2 mm slice thickness, 38 interleaved slices with no gap, total acquisition time = 5:42 min).\nArea of acquisition\nT1-weighted and dMRI scans = whole-brain\nT2-weighted scan = high-resolution imaging of medial temporal lobe\nDiffusion MRI\nUsed\nNot used\nParameters TR = 4300 ms, echo time = 100.2 ms, 139 directions, b-max = 4990, FoV = 259 x 259 mm, 78 slices, 1.7986 x 1.7986 x 1.8 mm voxel resolution", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed4.pdf" - }, - { - "text": "INTRODUCTION\nFeats of strength have fascinated man since the early stages of human civilization, as shown by the archeological evidence of inscribed heavy stones at Olympia and Thera in Greece, dated to the 6th century BC, detailing the way they were lifted by Bybon and Eumastus, respectively (1). Over the centuries, many types of strength competitions have existed; some of which have been codi /uniFB01 ed and endured within modern sporting competitions (e.g., weightlifting, powerlifting, and shot put).Inaddition,professionalstrongmancompetitions,such as the annually contested ' World ' s Strongest Man ' event, generate extensive global interest (2). Moreover, scienti /uniFB01 c understanding of muscular strength is important because of its role in athletic performance (3), injury prevention (4), and\nhealthy aging (5). However, our knowledge of extreme human strength is limited.\nTo date, there is little scienti /uniFB01 c information on the characteristics of extremely strong humans in terms of laboratorybased tests of strength and power, particularly the size and distribution of their muscle mass, as well as tendon size and joint mechanics (moment arm). Kraemer et al. (6)examinedthe body composition of elite strongman competitors using dualenergy X-ray absorptiometry scanning and found that they had a body mass (153±19 kg) and lean mass (118±12 kg) approximately twice that of an average untrained healthy young man. Whole body skeletal muscle mass of athletes from strength- and power-based sports has also been estimated using ultrasound measurements at a limited number of anatomical locations (7, 8). However, neither ultrasound-derived\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). Submitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024\nwww.jappl.org\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0.\nPublished by the American Physiological Society. Downloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\n789\nWORLD STRONGMAN AND DEADLIFT CHAMPION", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "Participant\nThe WSM ' s achievements included one World ' sStrongest Man title (14 mo prior to measurement), /uniFB01 ve Britain ' s Strongest Man titles (the most recent 6 mo prior to measurement), twice being World Deadlift Champion and Deadlift WorldRecordholder(500kg;atthetimeofmeasurement), and second place at Europe ' s Strongest Man. Prior to agreeing to participate, the purpose of the research study and the testing procedures were explained to the participant along with the risks and bene /uniFB01 ts of taking part. The participant gave his written informed consent to participate in the study that was approved by the Loughborough University Ethical Advisory Committee (Ethics Number R18-P090). Included in the written consent was a statement providing permission for publication of the collected data and the likelihood that their identity may be evident based on their achievements and characteristics, despite anonymization.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "Acknowledgements\nThe authors would like to thank M. Mendoza for his phlebotomy and MRI assistance at the UCSB Brain Imaging Center; C. Stark and R. Tain for MRI assistance at the UCI Facility for Imaging and Brain", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What is typical age at which multiple sclerosis is diagnosed ?", - "target_page": 2, - "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "References\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising prevalence of multiple sclerosis worldwide: insights from the Atlas of MS, third edition. Mult Scler . (2020) 26(14):1816 -21. doi: 10.1177/1352458520970841\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in people with multiple sclerosis: meta-analysis. Scand J Med Sci Sports . (2018) 28 (9):1960 -9. doi: 10.1111/sms.13214\n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less physically active than healthy controls but as active as those with other chronic diseases: an updated meta-analysis. Mult Scler Relat Disord . (2017) 13:38 -43. doi: 10.1016/j.msard.2017.01.016\n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia (ESSA) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Med Sport . (2022) 25(2):146 -54. doi: 10.1016/j.jsams.2021.08.015\n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG. Exercise as medicine in multiple sclerosis -time for a paradigm shift: preventive, symptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci Rep . (2019) 19(11):1 -12. doi: 10.1007/s11910-019-1002-3", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "References\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF, Gaemelke T, et al. Investigating the potential disease-modifying and neuroprotective ef /uniFB01 cacy of exercise therapy early in the disease course of multiple sclerosis: the early multiple sclerosis exercise study (EMSES). Mult Scler . (2022) 28(10):1620 -9. doi: 10. 1177/13524585221079200\n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and lifestyle physical activity recommendations for people with multiple sclerosis throughout the disease course. Mult Scler . (2020) 26(12):1459 -69. doi: 10.1177/ 1352458520915629\n8. Moreno-Navarro P, Manca A, Martinez G, Ventura L, Barbado D, Vera-García FJ, et al. Test-retest reliability and known-groups validity of trunk muscle tests in people with multiple sclerosis: a cross-sectional, case-control study. Phys Ther . (2021) 101 (5):1 -9. doi: 10.1093/ptj/ptzab049\n9. Raats J, Arntzen EC, Lamers I, Feys P, Normann B. What is the distribution of trunk impairments and its relationship with disability level in individuals with multiple sclerosis? Mul Scler Relat Disord . (2021) 57:103325. doi: 10.1016/j.msard. 2021.103325\n10. Normann B, Arntzen EC. What are the relationships between trunk control, balance and walking in individuals with multiple sclerosis with minor to moderate disability? Eur J Physiother . (2021) 23(6):377 -83. doi: 10.1080/21679169.2020.1772870\nFrontiers in Rehabilitation Sciences\n10\nfrontiersin.org", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 9: Table showing the age breakdown of individuals testing positive for opiates-only or positive-for-both as a proportion of all individuals first testing positive in that year.\n26%, Age 18 - 24 = 27%. 26%, Age 25 - 29 = 24%. 26%, Age 30 - 34 = 16%. 26%, Age 35 - 39 = 7%. 26%, Age 40 over = 100%. 26%, Total = 2004. 23%, Age 18 - 24 = 27%. 23%, Age 25 - 29 = 24%. 23%, Age 30 - 34 = 17%. 23%, Age 35 - 39 = 9%. 23%, Age 40 over = 100%. 23%, Total = 2005. 25%, Age 18 - 24 = 26%. 25%, Age 25 - 29 = 22%. 25%, Age 30 - 34 = 17%. 25%, Age 35 - 39 = 11%. 25%, Age 40 over = 100%. 25%, Total = 2006. 24%, Age 18 - 24 = 25%. 24%, Age 25 - 29 = 21%. 24%, Age 30 - 34 = 16%. 24%, Age 35 - 39 = 13%. 24%, Age 40 over = 100%. 24%, Total = 2007. 21%, Age 18 - 24 = 23%. 21%, Age 25 - 29 = 21%. 21%, Age 30 - 34 = 18%. 21%, Age 35 - 39 = 16%. 21%, Age 40 over = 100%. 21%, Total = 2008. 23%, Age 18 - 24 = 22%. 23%, Age 25 - 29 = 20%. 23%, Age 30 - 34 = 17%. 23%, Age 35 - 39 = 18%. 23%, Age 40 over = 100%. 23%, Total = 2009. 22%, Age 18 - 24 = 21%. 22%, Age 25 - 29 = 20%. 22%, Age 30 - 34 = 17%. 22%, Age 35 - 39 = 20%. 22%, Age 40 over = 100%. 22%, Total = 2010. 22%, Age 18 - 24 = 19%. 22%, Age 25 - 29 = 20%. 22%, Age 30 - 34 = 16%. 22%, Age", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 9: Table showing the age breakdown of individuals testing positive for opiates-only or positive-for-both as a proportion of all individuals first testing positive in that year.\n35 - 39 = 22%. 22%, Age 40 over = 100%. 22%, Total = 2011. 19%, Age 18 - 24 = 20%. 19%, Age 25 - 29 = 22%. 19%, Age 30 - 34 = 17%. 19%, Age 35 - 39 = 23%. 19%, Age 40 over = 100%. 19%, Total = 2012. 17%, Age 18 - 24 = 20%. 17%, Age 25 - 29 = 22%. 17%, Age 30 - 34 = 16%. 17%, Age 35 - 39 = 25%. 17%, Age 40 over = 100%. 17%, Total = 2013", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and by year of first test.\n2004, Age 18-24 = 3,150. 2004, Age 25-29 = 3,319. 2004, Age 30-34 = 2,938. 2004, Age 35-39 = 1,958. 2004, Age 40 over = 881. 2004, Total = 12,246. 2005, Age 18-24 = 2,391. 2005, Age 25-29 = 2,832. 2005, Age 30-34 = 2,548. 2005, Age 35-39 = 1,791. 2005, Age 40 over = 977. 2005, Total = 10,539. 2006, Age 18-24 = 3,635. 2006, Age 25-29 = 3,768. 2006, Age 30-34 = 3,275. 2006, Age 35-39 = 2,491. 2006, Age 40 over = 1,580. 2006, Total = 14,749. 2007, Age 18-24 = 3,182. 2007, Age 25-29 = 3,359. 2007, Age 30-34 = 2,869. 2007, Age 35-39 = 2,178. 2007, Age 40 over = 1,803. 2007, Total = 13,391. 2008, Age 18-24 = 2,912. 2008, Age 25-29 = 3,197. 2008, Age 30-34 = 2,857. 2008, Age 35-39 = 2,425. 2008, Age 40 over = 2,238. 2008, Total = 13,629. 2009, Age 18-24 = 2,711. 2009, Age 25-29 = 2,594. 2009, Age 30-34 = 2,304. 2009, Age 35-39 = 1,998. 2009, Age 40 over = 2,048. 2009, Total = 11,655. 2010, Age 18-24 = 2,287. 2010, Age 25-29 = 2,180. 2010, Age 30-34 = 2,105. 2010, Age 35-39 = 1,744. 2010, Age 40", - "page_start": 18, - "page_end": 18, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and by year of first test.\nover = 2,075. 2010, Total = 10,391. 2011, Age 18-24 = 1,772. 2011, Age 25-29 = 1,519. 2011, Age 30-34 = 1,622. 2011, Age 35-39 = 1,274. 2011, Age 40 over = 1,726. 2011, Total = 7,913. 2012, Age 18-24 = 1,136. 2012, Age 25-29 = 1,179. 2012, Age 30-34 = 1,300. 2012, Age 35-39 = 1,030. 2012, Age 40 over = 1,377. 2012, Total = 6,022. 2013, Age 18-24 = 721. 2013, Age 25-29 = 850. 2013, Age 30-34 = 938. 2013, Age 35-39 = 704. 2013, Age 40 over = 1,068. 2013, Total = 4,281. Total, Age 18-24 = 23,897. Total, Age 25-29 = 24,797. Total, Age 30-34 = 22,756. Total, Age 35-39 = 17,593. Total, Age 40 over = 15,773. Total, Total = 104,816", - "page_start": 18, - "page_end": 18, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Publisher ' s note\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical activity interventions among persons with multiple sclerosis. Neurorehabil Neural Repair . (2019) 33(1):3 -14. doi: 10.1177/1545968318818904\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in /uniFB01 tness, mobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139 (2):183 -91. doi: 10.1111/ane.13041\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, individualized physiotherapy intervention for people with multiple sclerosis: a qualitative study. Physiother Res Int . (2019) 25(3):e1829. doi: 10.1002/pri.1829\n44. Normann B. Facilitation of movement: new perspectives provide expanded insights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 -78. doi: 10.1080/09593985.2018.1493165\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in physical therapy. Physiother Theory Pract . (2015) 31(4):244 -52. doi: 10.3109/ 09593985.2014.1002873\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported physical activity correlates in Swedish adults with multiple sclerosis: a cross-sectional study. BMC Neurol . (2017) 17(1):204. doi: 10.1186/s12883-0170981-4\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for persons with multiple sclerosis: a review and agenda for future research. Int J MS Care . (2021) 23(4):186 -92. doi: 10.7224/1537-2073.2020-066", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "Acknowledgments\nIn conclusion, our study measured dyspnea impact in individuals with no preexisting diagnosis of lung disease who reported respiratory symptoms as part of a purposeful case /uniFB01 nding strategy. Individuals with PRISm exhibited the greatest impact of dyspnea, even higher than those newly diagnosed with asthma or COPD. After adjusting for patient factors, comorbidities, pulmonary diseases, and severity of lung physiologic impairment, most of the variability in dyspnea remained unexplained. We also showed that dyspnea was associated with increased health care utilization, impaired quality of life, and work productivity.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "2.5 Recruitment and participants\nPrior to recruitment, the study was introduced to individuals with multiple sclerosis (pwMS) through a seminar hosted by the Nordland MS Association. Additionally, seminars were conducted for health professionals in community healthcare and at the regional hospital. Written information about this study (and the RCT) was sent from the MS clinic at the regional hospital by post to all eligible individuals af /uniFB01 liated with the hospital. Individuals who wished to participate signed the attached consent form and returned it in the pre-stamped envelope. The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29)of ≤ 3.5, was ≥ 18 years, was employed (10% -100% of full-time) and residential address in the two prede /uniFB01 ned municipalities. The exclusion criteria were as follows: pregnancy, exacerbation of symptoms within two weeks prior to enrollment and other serious conditions compromising balance, walking or work capacity. All participants in the intervention group of the RCT ( n = 15) were included (Table 3).", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "Take-home Points\nStudy Question: How profoundly are adults with undiagnosed respiratory symptoms affected by dyspnea?\nResults: In community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with preserved ratio impaired spirometry experienced the greatest impact of dyspnea, followed by those with undiagnosed asthma or COPD. Greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nInterpretation: Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity.\nDyspnea refers to a subjective sensation of breathing discomfort. 1 In a study involving a community-based population aged > 70 years, the prevalence of dyspnea was found to be 32%. 2 Dyspnea can lead to limitations in daily activities, reduced exercise tolerance, and heightened mortality risks. 3\nDyspnea not only affects individuals with diagnosed respiratory conditions but also poses a signi /uniFB01 cant burden on those with undiagnosed conditions. In a systematic review by Müller et al, 4 the combined", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What was the average year of the group that participated to the study concerning the impact of outdoor pysiotherapy on patient with multiple sclerosis", - "target_page": 4, - "target_passage": "Age in years Mean 47.6", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Acknowledgments\nIn conclusion, our study measured dyspnea impact in individuals with no preexisting diagnosis of lung disease who reported respiratory symptoms as part of a purposeful case /uniFB01 nding strategy. Individuals with PRISm exhibited the greatest impact of dyspnea, even higher than those newly diagnosed with asthma or COPD. After adjusting for patient factors, comorbidities, pulmonary diseases, and severity of lung physiologic impairment, most of the variability in dyspnea remained unexplained. We also showed that dyspnea was associated with increased health care utilization, impaired quality of life, and work productivity.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Publisher ' s note\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical activity interventions among persons with multiple sclerosis. Neurorehabil Neural Repair . (2019) 33(1):3 -14. doi: 10.1177/1545968318818904\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in /uniFB01 tness, mobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139 (2):183 -91. doi: 10.1111/ane.13041\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, individualized physiotherapy intervention for people with multiple sclerosis: a qualitative study. Physiother Res Int . (2019) 25(3):e1829. doi: 10.1002/pri.1829\n44. Normann B. Facilitation of movement: new perspectives provide expanded insights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 -78. doi: 10.1080/09593985.2018.1493165\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in physical therapy. Physiother Theory Pract . (2015) 31(4):244 -52. doi: 10.3109/ 09593985.2014.1002873\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported physical activity correlates in Swedish adults with multiple sclerosis: a cross-sectional study. BMC Neurol . (2017) 17(1):204. doi: 10.1186/s12883-0170981-4\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for persons with multiple sclerosis: a review and agenda for future research. Int J MS Care . (2021) 23(4):186 -92. doi: 10.7224/1537-2073.2020-066", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "Intervention\nAll physical therapy treatment was provided at the discretion of the treating clinician. The duration of the episode, the number of physical therapy visits, and individual treatment parameters (type, intensity, duration, frequency) were not collected for pragmatic reasons. In particular, clinical and utilization data are not commonly collected in a standardized format and would need to be extracted from disparate medical record databases across different health care systems to assess treatment. This was not feasible given the scope and design of this multisite survey-based study. However, instead of coding treatment type we included baseline-to-4 week change in pain intensity, region-specific disability, and OSPRO-YF scores in each model as measures of treatment response. In that manner the individual effects of the treatment received were included in the predictive models, without directly accounting for the type of treatment.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "1 Introduction\nTABLE 1 Overview of the CoreDISTparticipation intervention.\nTABLE 2 Description of the outdoor group.\nWeek 1: MS outpatient clinic, 1 = Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge of MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators . Physiotherapy assessment (60 min) to explore the potential for changes in balance and walking aiming to turn focus toward possibilities and thus,. , 1 = Based on these assessments the MS nurse and the physiotherapist indicated the aspects of importance on a standardized form to inform the municipal physiotherapist.. , 1 = Standardized testing (baseline, for the RCT).. Week 2 - 5: Municipality, 1 = Physiotherapy assessment (60 - 90 min) to explore the patient ' s impairments and potential for improvements in a clinical examination prior to group-training.. , 1 = Indoor group (60 min × 2 weekly, for 4 weeks). There were three to /uniFB01 ve participants in each group and one physiotherapist. Trunk control, balance and physical activity were addressed (GroupCoreDIST). Participants received a link to CoreDIST digital exercise-videos and were advised to do them 1 × weekly throughout the intervention. (videos can be accessed here: https://www.nord.no/en/node/35,098). , 1 = Digital meeting with a multidisciplinary team (pwMS, employer, physiotherapist & MS nurse) (20 min) regarding barriers to work participation and needs for adaptations regarding work and physical activity, according to a structured meeting-guide (one meeting).. Week 6, 1 = Standardized testing (midway, for the RCT).. Week 7 - 10: Municipality, 1 = Outdoor group (60 min × 2 weekly, for 4 weeks). A maximum of ten participants and two physiotherapists were included in each group. Trunk control and balance (GroupCoreDIST exercises) were addressed, and high-intensity walking or running was performed. The intervention was conducted in a city park where both /uniFB02 at and uneven surfaces and hilly terrain were available (Table 2).. , 1 = Additionally, participants were encouraged to comply with the exercise-videos", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" - }, - { - "text": "Recruitment of Undiagnosed Cases and Healthy\nDyspnea is a prevalent symptom with consequences that extend beyond its physiologic implications. A study in European patients with COPD explored the burden of dyspnea and identi /uniFB01 ed potential correlates. The study revealed that higher dyspnea impact correlated with lower health-related quality of life, increased work impairment, and a higher frequency of emergency department visits. 7\nThe three objectives of our study were as follows: (1) to evaluate the impact of dyspnea in adults from the general population who had no prior diagnosis of respiratory disease but who reported having signi /uniFB01 cant respiratory symptoms in the past 6 months; (2) to identify associated risk factors for dyspnea and estimate their in /uniFB02 uence on the symptom; and (3) to explore the relationship between dyspnea and health care utilization, quality of life, and work productivity in adults with undiagnosed respiratory symptoms.\nthe study was obtained from the research ethics boards of the 17 participating study sites across Canada. Informed, written consent was provided by all study participants.\nBoth landlines and cellphones within a 90-minute radius of any of the 17 study sites were dialed randomly. A\n(P. H.), Dalhousie University, Halifax, NS; the Department of Medicine (I. M. and M. B.), University of Alberta, Edmonton, AB; the Department of Medicine (M. D. L.), Queen ' s University, Kingston; the Department of Medicine (C. J. L.), University of Western Ontario, London, ON; the Department of Medicine (T. A.), Memorial University, St. John ' s, NF; the Department of Medicine (N. E.), McGill University, Montreal, QC; the Department of Medicine (M. A.), University of Manitoba, Winnipeg, MN, Canada.\nDrs Bierbrier and Gerstein contributed equally to this manuscript.\nPart of this work has been presented at the American Thoracic Society Conference, May 17-22, 2024, San Diego, CA.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "1 Introduction\n1 GroupCoreDIST is a group-based intervention (Group), involving 35 exercises at different levels, addressing activation of trunk musculature (Core) in motor tasks in lying, sitting and standing (e.g. rolling, reaching, squatting, single leg stance. DIST describes essential elements of the concept: D = dose (high), dual task; I = individualization, insight, intensity; S = sensorimotor activation, selective movement control; T = task oriented training.\nFrontiers in Rehabilitation Sciences\n02\nfrontiersin.org\nDiscussion: High-intensity training combined with detailed exercises in a physiotherapy outdoor group was perceived to create meaningful bodily changes and enhance PA and prospects for both PA and life. Importantly, however, some negative experiences were also reported from the high-intensity training. Enactive theory allowed for the illumination of new perspectives: the importance of embodiment for self-ef /uniFB01 cacy and of tailored physiotherapy and an outdoor-group environment for exploring one ' s own limits to physical capabilities. These aspects should inform future exercise interventions in pwMS with low disability.\nKEYWORDS\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, postural balance, enactive theory\nphysically active as their sensorimotor impairments improved (16). To address PA challenges in pwMS, GroupCoreDIST was further developed to include a four-week period of outdoor training, in which high-intensity walking/running and GroupCoreDIST exercises are integrated (Table 2). To our knowledge, combinations of high-intensity training and rehabilitation of speci /uniFB01 c sensorimotor functions have been sparsely explored. Patient perspectives are essential for the evaluation of healthcare interventions (17); however, the new outdoor component of CoreDISTparticipation has yet to be investigated from a /uniFB01 rst-person perspective. Particularly interesting is what participants perceive as meaningful regarding the intervention, as this is essential for motivation, motor learning and exercise adherence (18).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" - }, - { - "text": "3.4 Professional leadership, tailoring and co-creation of enjoyment\nThe way the physiotherapists led the group and, in particular, interacted with each participant were regarded as helpful for improving their bodily functions and activity levels. Some participants reported being afraid to try out new activities or training at high intensities after being diagnosed with MS but felt safe to explore when supervised by the physiotherapist because of their trust in the relationship between them and in the physiotherapist ' s professional knowledge.\nHow the physiotherapist approached the participants individually was described as important from this perspective. In particular, bodily interactions in which the physiotherapist demonstrated with his or her own body or placed his or her hands on the participant ' s body to correct a movement were reported to be successful, as it helped to increase speed and gave participants a sense of performing better or for a longer duration. If they did an exercise in a suboptimal way, participants reported receiving precise supervision, or if they expressed pain or were injured, the physiotherapist was supportive, assessed them and\nDahl et al.\n10.3389/fresc.2024.1303094\ngave them advice for follow-up. Some participants said that when the physiotherapist conducted the exercises or ran/walked together with them, it made them increase their exercise intensity. One participant described this as follows:\nThe physiotherapists pushed me to perform beyond what I thought I was able to -and that was great! There is no doubt that if someone is running beside you and shouting ' come onwell done ' , you manage to push yourself further. (ID8, EDSS: 2)\nHowever, one participant described an incident where the interaction with the physiotherapists was not perceived as helpful:\nWhen I get tired, it gets dif /uniFB01 cult. I can only do one thing at a time, and then these physiotherapists came running, talking and trying to motivate at the same time. I got very tired, and my leg would not follow my commands to run. (ID7, EDSS: 3.5)", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed13.pdf" - }, - { - "text": "Discussion\nA second limitation is that we did not know about the subjects ' prior experiences with physical therapy, or whether they arrived at physical therapy through direct access or referral from another provider. These factors could be associated with treatment expectations, which have known effects on treatment outcomes [52, 53]. We also did not collect specific information on treatment. But by including changes in pain, disability, and pain-related psychological distress in the models, we were able to account for treatment response. The benefit of this approach is that models are generalizable for predicting utilization outcomes across ' real-world ' pragmatic physical therapy settings where treatment variation is expected. The drawback is that we are prohibited from making conclusions regarding which characteristics of the clinical encounter might influence subsequent pain-related healthcare utilization. Important characteristics to consider would include number of visits, type of interventions or whether patients completed their course of physical therapy. These have been proposed or identified as important contributors to downstream costs following physical therapy [54, 55] and may be a source of unexplained variance in our models. Characteristics of the clinical encounter should be considered in future studies to refine the prediction models developed in our analyses.\nThird, we were unable to adequately model the specific effects of worker ' s compensation, self-pay and some\ncommercial insurance coverage on utilization due to the low incidence of these forms of payment in our study sample. Modeling these separately would have created the potential for unreliable and imprecise effect estimates. Readers should consider the within-group heterogeneity caused by this approach and exercise caution when applying these results to individuals who do not have traditional public or private insurance coverage. Future studies should investigate the performance of the OSPRO tools in predicting outcomes for patients with Worker ' s Compensation.\nA final limitation is the use of patient recall to measure utilization. To mitigate recall bias, we used two follow-up points, at 6 and 12 months. However, underor over-reporting of utilization is often a concern with studies requiring subject recall [56 -58]. Medical record and claims data were not available for these subjects. Readers should consider our inability to independently confirm utilization when interpreting results.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed5.pdf" - }, - { - "text": "4.4 Implications for clinical practice\nCombining high-intensity walking/running and detailed sensorimotor exercises was valued and provided meaningful embodied experiences, improving participants ' ability to master PA and their beliefs of their own possibilities for being active in the future. However, the manner in which the content of an exercise intervention is delivered and the environment in which it is delivered should be accounted for, as these aspects were perceived to be of great importance in creating and shaping participants ' experiences. In particular, tailored physiotherapistparticipant bodily interactions and an engaging group and outdoor environment were perceived to be pertinent for exploring one ' s own potential.\nTo minimize negative incidents in future interventions, we suggest that (1) the effort required from one ' s leg muscles during the detailed exercises (in between the running/walking intervals) should be low to minimize the negative consequences of leg muscle fatigue prior to high-intensity running/walking, (2) the capacity for running/walking at highintensity should be explored in one-to-one physiotherapy assessment prior to group training to optimize individuals capabilities and safety, and (3) homogenous and small-sized groups should be used to enable ongoing and tailored physiotherapist-participant interactions.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "Methods: This qualitative study was nested within an RCT exploring a novel intervention integrating sensorimotor exercises with high-intensity intervals of running/walking. Individual, in-depth interviews with the intervention group ( n =15; 12 women, 3 men; age 38 -66; EDSS score 0 -3.5) were conducted postintervention (mean days = 14), analyzed using a phenomenologicalinspired approach with systematic text condensation, and interpreted based on enactive theory.\nResults: Four categories were generated: (1) Exploration of one ' s own physical abilities: Challenging one ' s own limits was perceived by all participants to improve movement performance and/or intensity level. Such bodily changes engendered strong positive feelings. Some negative consequences of highintensity training were described, increasing a feeling of loss. (2) New insights and beliefs: Participants experienced enhanced beliefs in their own capabilities, which they integrated in activities outside the intervention. (3) An engaging environment: The group setting was perceived as supportive, and the outdoor environment was perceived as stimulating activity. (4) Professional leadership, tailoring and co-creation of enjoyment: Physiotherapist-led, individualized interactions were regarded as necessary to safely revisit prior activities, such as running. Co-creating enjoyment facilitated high-intensity training and intervention adherence.\nDahl et al.\n10.3389/fresc.2024.1303094", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What were the prerequisites allowing to be involved in the study concerning the impact of outdoor sport on patients witg multiple sclerosis ?", - "target_page": 4, - "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "References\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising prevalence of multiple sclerosis worldwide: insights from the Atlas of MS, third edition. Mult Scler . (2020) 26(14):1816 -21. doi: 10.1177/1352458520970841\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in people with multiple sclerosis: meta-analysis. Scand J Med Sci Sports . (2018) 28 (9):1960 -9. doi: 10.1111/sms.13214\n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less physically active than healthy controls but as active as those with other chronic diseases: an updated meta-analysis. Mult Scler Relat Disord . (2017) 13:38 -43. doi: 10.1016/j.msard.2017.01.016\n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia (ESSA) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Med Sport . (2022) 25(2):146 -54. doi: 10.1016/j.jsams.2021.08.015\n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG. Exercise as medicine in multiple sclerosis -time for a paradigm shift: preventive, symptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci Rep . (2019) 19(11):1 -12. doi: 10.1007/s11910-019-1002-3", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "2.5 Recruitment and participants\nPrior to recruitment, the study was introduced to individuals with multiple sclerosis (pwMS) through a seminar hosted by the Nordland MS Association. Additionally, seminars were conducted for health professionals in community healthcare and at the regional hospital. Written information about this study (and the RCT) was sent from the MS clinic at the regional hospital by post to all eligible individuals af /uniFB01 liated with the hospital. Individuals who wished to participate signed the attached consent form and returned it in the pre-stamped envelope. The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29)of ≤ 3.5, was ≥ 18 years, was employed (10% -100% of full-time) and residential address in the two prede /uniFB01 ned municipalities. The exclusion criteria were as follows: pregnancy, exacerbation of symptoms within two weeks prior to enrollment and other serious conditions compromising balance, walking or work capacity. All participants in the intervention group of the RCT ( n = 15) were included (Table 3).", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "References\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF, Gaemelke T, et al. Investigating the potential disease-modifying and neuroprotective ef /uniFB01 cacy of exercise therapy early in the disease course of multiple sclerosis: the early multiple sclerosis exercise study (EMSES). Mult Scler . (2022) 28(10):1620 -9. doi: 10. 1177/13524585221079200\n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and lifestyle physical activity recommendations for people with multiple sclerosis throughout the disease course. Mult Scler . (2020) 26(12):1459 -69. doi: 10.1177/ 1352458520915629\n8. Moreno-Navarro P, Manca A, Martinez G, Ventura L, Barbado D, Vera-García FJ, et al. Test-retest reliability and known-groups validity of trunk muscle tests in people with multiple sclerosis: a cross-sectional, case-control study. Phys Ther . (2021) 101 (5):1 -9. doi: 10.1093/ptj/ptzab049\n9. Raats J, Arntzen EC, Lamers I, Feys P, Normann B. What is the distribution of trunk impairments and its relationship with disability level in individuals with multiple sclerosis? Mul Scler Relat Disord . (2021) 57:103325. doi: 10.1016/j.msard. 2021.103325\n10. Normann B, Arntzen EC. What are the relationships between trunk control, balance and walking in individuals with multiple sclerosis with minor to moderate disability? Eur J Physiother . (2021) 23(6):377 -83. doi: 10.1080/21679169.2020.1772870\nFrontiers in Rehabilitation Sciences\n10\nfrontiersin.org", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "1 Introduction\nTABLE 1 Overview of the CoreDISTparticipation intervention.\nTABLE 2 Description of the outdoor group.\nWeek 1: MS outpatient clinic, 1 = Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge of MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators . Physiotherapy assessment (60 min) to explore the potential for changes in balance and walking aiming to turn focus toward possibilities and thus,. , 1 = Based on these assessments the MS nurse and the physiotherapist indicated the aspects of importance on a standardized form to inform the municipal physiotherapist.. , 1 = Standardized testing (baseline, for the RCT).. Week 2 - 5: Municipality, 1 = Physiotherapy assessment (60 - 90 min) to explore the patient ' s impairments and potential for improvements in a clinical examination prior to group-training.. , 1 = Indoor group (60 min × 2 weekly, for 4 weeks). There were three to /uniFB01 ve participants in each group and one physiotherapist. Trunk control, balance and physical activity were addressed (GroupCoreDIST). Participants received a link to CoreDIST digital exercise-videos and were advised to do them 1 × weekly throughout the intervention. (videos can be accessed here: https://www.nord.no/en/node/35,098). , 1 = Digital meeting with a multidisciplinary team (pwMS, employer, physiotherapist & MS nurse) (20 min) regarding barriers to work participation and needs for adaptations regarding work and physical activity, according to a structured meeting-guide (one meeting).. Week 6, 1 = Standardized testing (midway, for the RCT).. Week 7 - 10: Municipality, 1 = Outdoor group (60 min × 2 weekly, for 4 weeks). A maximum of ten participants and two physiotherapists were included in each group. Trunk control and balance (GroupCoreDIST exercises) were addressed, and high-intensity walking or running was performed. The intervention was conducted in a city park where both /uniFB02 at and uneven surfaces and hilly terrain were available (Table 2).. , 1 = Additionally, participants were encouraged to comply with the exercise-videos", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" - }, - { - "text": "1 Introduction\n1 GroupCoreDIST is a group-based intervention (Group), involving 35 exercises at different levels, addressing activation of trunk musculature (Core) in motor tasks in lying, sitting and standing (e.g. rolling, reaching, squatting, single leg stance. DIST describes essential elements of the concept: D = dose (high), dual task; I = individualization, insight, intensity; S = sensorimotor activation, selective movement control; T = task oriented training.\nFrontiers in Rehabilitation Sciences\n02\nfrontiersin.org\nDiscussion: High-intensity training combined with detailed exercises in a physiotherapy outdoor group was perceived to create meaningful bodily changes and enhance PA and prospects for both PA and life. Importantly, however, some negative experiences were also reported from the high-intensity training. Enactive theory allowed for the illumination of new perspectives: the importance of embodiment for self-ef /uniFB01 cacy and of tailored physiotherapy and an outdoor-group environment for exploring one ' s own limits to physical capabilities. These aspects should inform future exercise interventions in pwMS with low disability.\nKEYWORDS\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, postural balance, enactive theory\nphysically active as their sensorimotor impairments improved (16). To address PA challenges in pwMS, GroupCoreDIST was further developed to include a four-week period of outdoor training, in which high-intensity walking/running and GroupCoreDIST exercises are integrated (Table 2). To our knowledge, combinations of high-intensity training and rehabilitation of speci /uniFB01 c sensorimotor functions have been sparsely explored. Patient perspectives are essential for the evaluation of healthcare interventions (17); however, the new outdoor component of CoreDISTparticipation has yet to be investigated from a /uniFB01 rst-person perspective. Particularly interesting is what participants perceive as meaningful regarding the intervention, as this is essential for motivation, motor learning and exercise adherence (18).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" - }, - { - "text": "4.4 Implications for clinical practice\nCombining high-intensity walking/running and detailed sensorimotor exercises was valued and provided meaningful embodied experiences, improving participants ' ability to master PA and their beliefs of their own possibilities for being active in the future. However, the manner in which the content of an exercise intervention is delivered and the environment in which it is delivered should be accounted for, as these aspects were perceived to be of great importance in creating and shaping participants ' experiences. In particular, tailored physiotherapistparticipant bodily interactions and an engaging group and outdoor environment were perceived to be pertinent for exploring one ' s own potential.\nTo minimize negative incidents in future interventions, we suggest that (1) the effort required from one ' s leg muscles during the detailed exercises (in between the running/walking intervals) should be low to minimize the negative consequences of leg muscle fatigue prior to high-intensity running/walking, (2) the capacity for running/walking at highintensity should be explored in one-to-one physiotherapy assessment prior to group training to optimize individuals capabilities and safety, and (3) homogenous and small-sized groups should be used to enable ongoing and tailored physiotherapist-participant interactions.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "Publisher ' s note\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical activity interventions among persons with multiple sclerosis. Neurorehabil Neural Repair . (2019) 33(1):3 -14. doi: 10.1177/1545968318818904\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in /uniFB01 tness, mobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139 (2):183 -91. doi: 10.1111/ane.13041\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, individualized physiotherapy intervention for people with multiple sclerosis: a qualitative study. Physiother Res Int . (2019) 25(3):e1829. doi: 10.1002/pri.1829\n44. Normann B. Facilitation of movement: new perspectives provide expanded insights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 -78. doi: 10.1080/09593985.2018.1493165\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in physical therapy. Physiother Theory Pract . (2015) 31(4):244 -52. doi: 10.3109/ 09593985.2014.1002873\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported physical activity correlates in Swedish adults with multiple sclerosis: a cross-sectional study. BMC Neurol . (2017) 17(1):204. doi: 10.1186/s12883-0170981-4\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for persons with multiple sclerosis: a review and agenda for future research. Int J MS Care . (2021) 23(4):186 -92. doi: 10.7224/1537-2073.2020-066", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "4.2.2 Attributable fractions, risk pairs and burden of disease\nAs mentioned, for the majority of diseases the working conditions are one of several influence factors in combination with other factors like private life, social and medical system, genetics, environment and so on. The exact impact of this factor, that is, the fraction of disease generating or intensifying impact attributable to work , is the subject of numerous studies in occupational epidemiology. 210\nThe overall relation between work and illnesses is moving towards a less unambiguous picture compared to occupational diseases, where a strong relation between a single (over-)exposure and a specific illness existed. These were mostly high exposure levels that could not be found outside workplaces. Obviously, many such high exposures still exist and are important for prevention and compensation. However, many exposures at work approximate to other non-work exposures, like permanent sedentary work. This makes it more difficult to separate unambiguously the impact of work.\nScience, in particular occupational epidemiology, and institutions like the ILO and WHO studies have engaged to identify the approximate impact of work for diseases, the attributable fraction of work .\nFor example, the WHO summarised their estimates in the year 2017:\n'Certain occupational risks, such as injuries, noise, carcinogenic agents, airborne particles and ergonomic risks account for a substantial part of the burden of chronic diseases: 37% of all cases of back pain, 16% of hearing loss, 13% of chronic obstructive pulmonary disease, 11% of asthma, 8% of injuries, 9% of lung cancer, 2% of leukaemia and 8% of depression.' 211\nOne major difficulty surely is the reliable description of exposures at work . Workers might have had several occupations during their working life, or changed work tasks in the same occupation due to organisational and technological developments, and they might also have changed the specialisation in this occupation; also the level of prevention measures differs between sectors and countries. Of course, all this influences the exposure patterns.", - "page_start": 80, - "page_end": 80, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "2.3 Study context\nThis interview study was nested within a randomized controlled trial (RCT) comparing the CoreDISTparticipation intervention to usual care (26) and conducted at a regional hospital MS-outpatient clinic (Nordland Hospital Trust) and in two af /uniFB01 liated municipalities in the northern Norway. The current study investigates participants in the intervention group ' s experiences of the four-week outdoor group, which was part of this new intervention (Table 2). The outdoor sessions were conducted by three trained physiotherapists working in the\nDahl et al.\n10.3389/fresc.2024.1303094\ncommunity healthcare in the two municipalities. The project team included three individuals representing users from the Nordland MS Association, along with an MS nurse and a neurologist from the MS-outpatient clinic, and three physiotherapists/ researchers.", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "3.4 Professional leadership, tailoring and co-creation of enjoyment\nThe way the physiotherapists led the group and, in particular, interacted with each participant were regarded as helpful for improving their bodily functions and activity levels. Some participants reported being afraid to try out new activities or training at high intensities after being diagnosed with MS but felt safe to explore when supervised by the physiotherapist because of their trust in the relationship between them and in the physiotherapist ' s professional knowledge.\nHow the physiotherapist approached the participants individually was described as important from this perspective. In particular, bodily interactions in which the physiotherapist demonstrated with his or her own body or placed his or her hands on the participant ' s body to correct a movement were reported to be successful, as it helped to increase speed and gave participants a sense of performing better or for a longer duration. If they did an exercise in a suboptimal way, participants reported receiving precise supervision, or if they expressed pain or were injured, the physiotherapist was supportive, assessed them and\nDahl et al.\n10.3389/fresc.2024.1303094\ngave them advice for follow-up. Some participants said that when the physiotherapist conducted the exercises or ran/walked together with them, it made them increase their exercise intensity. One participant described this as follows:\nThe physiotherapists pushed me to perform beyond what I thought I was able to -and that was great! There is no doubt that if someone is running beside you and shouting ' come onwell done ' , you manage to push yourself further. (ID8, EDSS: 2)\nHowever, one participant described an incident where the interaction with the physiotherapists was not perceived as helpful:\nWhen I get tired, it gets dif /uniFB01 cult. I can only do one thing at a time, and then these physiotherapists came running, talking and trying to motivate at the same time. I got very tired, and my leg would not follow my commands to run. (ID7, EDSS: 3.5)", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "What was the sales revenue of Santos in 2004 ?", - "target_page": 12, - "target_passage": " Sales revenue was a record $1,501 million", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "(c) Acquisition of controlled entities\nyear the following controlled entities were registered:. During the financial year the following controlled entities were registered:, Consolidated.2003 $million = . During the financial year the following controlled entities were registered:, Santos Ltd.2004 $million = . During the financial year the following controlled entities were registered:, Santos Ltd.2003 $million = . Santos Direct Pty Ltd, Consolidated.2004 $million = Santos Brantas Pty Ltd. Santos Direct Pty Ltd, Consolidated.2003 $million = . Santos Direct Pty Ltd, Santos Ltd.2004 $million = . Santos Direct Pty Ltd, Santos Ltd.2003 $million = . Santos Egypt Pty Ltd, Consolidated.2004 $million = Santos (Donggala) Pty Ltd. Santos Egypt Pty Ltd, Consolidated.2003 $million = . Santos Egypt Pty Ltd, Santos Ltd.2004 $million = . Santos Egypt Pty Ltd, Santos Ltd.2003 $million = \nAnnual Report 2004\n71\n72", - "page_start": 72, - "page_end": 73, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "STATEMENTS OF FINANCIAL PERFORMANCE\nProduct sales, Note = 2. Product sales, Consolidated.2004 $million = 1,500.9. Product sales, Consolidated.2003 $million = 1,465.0. Product sales, Santos Ltd.2004 $million = 568.8. Product sales, Santos Ltd.2003 $million = 616.3. Cost of sales, Note = 3. Cost of sales, Consolidated.2004 $million = (1,049.8). Cost of sales, Consolidated.2003 $million = (974.4). Cost of sales, Santos Ltd.2004 $million = (414.5). Cost of sales, Santos Ltd.2003 $million = (356.6). Gross profit, Note = . Gross profit, Consolidated.2004 $million = 451.1. Gross profit, Consolidated.2003 $million = 490.6. Gross profit, Santos Ltd.2004 $million = 154.3. Gross profit, Santos Ltd.2003 $million = 259.7. Other revenue, Note = 2. Other revenue, Consolidated.2004 $million = 252.3. Other revenue, Consolidated.2003 $million = 154.4. Other revenue, Santos Ltd.2004 $million = 858.0. Other revenue, Santos Ltd.2003 $million = 126.2. Other expenses, Note = 3. Other expenses, Consolidated.2004 $million = (129.0). Other expenses, Consolidated.2003 $million = (179.5). Other expenses, Santos Ltd.2004 $million = (221.0). Other expenses, Santos Ltd.2003 $million = (108.3). Borrowing costs, Note = 4. Borrowing costs, Consolidated.2004 $million = (33.6). Borrowing costs, Consolidated.2003 $million = (34.6). Borrowing costs, Santos Ltd.2004 $million = (91.1). Borrowing costs, Santos Ltd.2003 $million = (84.0). Profit from ordinary activities before income tax expense, Note = . Profit from ordinary activities before income tax expense, Consolidated.2004 $million = 540.8. Profit from ordinary activities before income tax expense, Consolidated.2003 $million = 430.9. Profit from ordinary activities before income tax expense, Santos Ltd.2004 $million = 700.2. Profit from ordinary activities before income tax expense, Santos Ltd.2003 $million = 193.6. Income tax expense relating to ordinary activities, Note =", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\nConsolidated.2003 $million = 154.4. , Santos Ltd.2004 $million = 858.0. , Santos Ltd.2003 $million = 126.2. 3. Expenses from Ordinary Activities, Consolidated.2004 $million = . 3. Expenses from Ordinary Activities, Consolidated.2003 $million = . 3. Expenses from Ordinary Activities, Santos Ltd.2004 $million = . 3. Expenses from Ordinary Activities, Santos Ltd.2003 $million = . Cost of sales:, Consolidated.2004 $million = . Cost of sales:, Consolidated.2003 $million = . Cost of sales:, Santos Ltd.2004 $million = . Cost of sales:, Santos Ltd.2003 $million = . Production costs, Consolidated.2004 $million = 308.5. Production costs, Consolidated.2003 $million = 263.6. Production costs, Santos Ltd.2004 $million = 113.8. Production costs, Santos Ltd.2003 $million = 95.2. Pipeline tariffs and tolls, Consolidated.2004 $million = 32.6. Pipeline tariffs and tolls, Consolidated.2003 $million = 33.3. Pipeline tariffs and tolls, Santos Ltd.2004 $million = 7.4. Pipeline tariffs and tolls, Santos Ltd.2003 $million = 3.2. Royalty, excise and PRRT, Consolidated.2004 $million = 154.0. Royalty, excise and PRRT, Consolidated.2003 $million = 131.4. Royalty, excise and PRRT, Santos Ltd.2004 $million = 73.1. Royalty, excise and PRRT, Santos Ltd.2003 $million = 41.6. Depreciation, depletion and amortisation, Consolidated.2004 $million = 536.4. Depreciation, depletion and amortisation, Consolidated.2003 $million = 528.8. Depreciation, depletion and amortisation, Santos Ltd.2004 $million = 209.2. Depreciation, depletion and amortisation, Santos Ltd.2003 $million = 194.7. Third party gas purchases, Consolidated.2004 $million = 14.9. Third party gas purchases, Consolidated.2003 $million = 5.4. Third party gas purchases, Santos Ltd.2004 $million = 12.2. Third party gas purchases, Santos Ltd.2003 $million = 12.4. , Consolidated.2004 $million = 1,046.4. ,", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\nConsolidated.2003 $million = 962.5. , Santos Ltd.2004 $million = 415.7. , Santos Ltd.2003 $million = 347.1. Decrease/(increase) in product stock, Consolidated.2004 $million = 3.4. Decrease/(increase) in product stock, Consolidated.2003 $million = 11.9. Decrease/(increase) in product stock, Santos Ltd.2004 $million = (1.2). Decrease/(increase) in product stock, Santos Ltd.2003 $million = 9.5. , Consolidated.2004 $million = 1,049.8. , Consolidated.2003 $million = 974.4. , Santos Ltd.2004 $million = 414.5. , Santos Ltd.2003 $million = 356.6. Other:, Consolidated.2004 $million = . Other:, Consolidated.2003 $million = . Other:, Santos Ltd.2004 $million = . Other:, Santos Ltd.2003 $million = . Selling, general and administrative expenses:, Consolidated.2004 $million = . Selling, general and administrative expenses:, Consolidated.2003 $million = . Selling, general and administrative expenses:, Santos Ltd.2004 $million = . Selling, general and administrative expenses:, Santos Ltd.2003 $million = . Operating expenses, Consolidated.2004 $million = 57.1. Operating expenses, Consolidated.2003 $million = 41.6. Operating expenses, Santos Ltd.2004 $million = 50.3. Operating expenses, Santos Ltd.2003 $million = 34.1. Depreciation and amortisation, Consolidated.2004 $million = 3.3. Depreciation and amortisation, Consolidated.2003 $million = 2.8. Depreciation and amortisation, Santos Ltd.2004 $million = 1.7. Depreciation and amortisation, Santos Ltd.2003 $million = 1.1. Write-down of investment in controlled entities, Consolidated.2004 $million = -. Write-down of investment in controlled entities, Consolidated.2003 $million = -. Write-down of investment in controlled entities, Santos Ltd.2004 $million = -. Write-down of investment in controlled entities, Santos Ltd.2003 $million = 40.8. Write-down of investment in listed shares, Consolidated.2004 $million = -. Write-down of investment in listed shares, Consolidated.2003 $million = 4.4.", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\n$million = 6.6. Equipment rentals, pipeline tariffs and other, Santos Ltd.2003 $million = 3.9. Interest revenue:, Consolidated.2004 $million = . Interest revenue:, Consolidated.2003 $million = . Interest revenue:, Santos Ltd.2004 $million = . Interest revenue:, Santos Ltd.2003 $million = . Controlled entities, Consolidated.2004 $million = -. Controlled entities, Consolidated.2003 $million = -. Controlled entities, Santos Ltd.2004 $million = 42.8. Controlled entities, Santos Ltd.2003 $million = 35.5. Other entities, Consolidated.2004 $million = 3.5. Other entities, Consolidated.2003 $million = 2.5. Other entities, Santos Ltd.2004 $million = 2.3. Other entities, Santos Ltd.2003 $million = 1.4. Dividends from other entities, Consolidated.2004 $million = -. Dividends from other entities, Consolidated.2003 $million = 0.4. Dividends from other entities, Santos Ltd.2004 $million = -. Dividends from other entities, Santos Ltd.2003 $million = 0.4. Dividends from controlled entities, Consolidated.2004 $million = -. Dividends from controlled entities, Consolidated.2003 $million = -. Dividends from controlled entities, Santos Ltd.2004 $million = 251.7. Dividends from controlled entities, Santos Ltd.2003 $million = -. Insurance recovery, Consolidated.2004 $million = 116.6. Insurance recovery, Consolidated.2003 $million = -. Insurance recovery, Santos Ltd.2004 $million = 73.8. Insurance recovery, Santos Ltd.2003 $million = -. Proceeds from sale of non-current assets, Consolidated.2004 $million = 98.9. Proceeds from sale of non-current assets, Consolidated.2003 $million = 108.0. Proceeds from sale of non-current assets, Santos Ltd.2004 $million = 462.1. Proceeds from sale of non-current assets, Santos Ltd.2003 $million = 62.7. Proceeds from sale of controlled entities, Consolidated.2004 $million = -. Proceeds from sale of controlled entities, Consolidated.2003 $million = 22.6. Proceeds from sale of controlled entities, Santos Ltd.2004 $million = -. Proceeds from sale of controlled entities, Santos Ltd.2003 $million = 3.9. , Consolidated.2004 $million = 252.3. ,", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\nfor the year ended 31 December 2004\nThe Santos Group has the following commitments for expenditure:, Consolidated.2004 $million = . The Santos Group has the following commitments for expenditure:, Consolidated.2003 $million = . The Santos Group has the following commitments for expenditure:, Santos Ltd.2004 $million = . The Santos Group has the following commitments for expenditure:, Santos Ltd.2003 $million = . (a) Capital commitments, Consolidated.2004 $million = . (a) Capital commitments, Consolidated.2003 $million = . (a) Capital commitments, Santos Ltd.2004 $million = . (a) Capital commitments, Santos Ltd.2003 $million = . Capital expenditure contracted for at balance date for which no amounts, Consolidated.2004 $million = . Capital expenditure contracted for at balance date for which no amounts, Consolidated.2003 $million = . Capital expenditure contracted for at balance date for which no amounts, Santos Ltd.2004 $million = . Capital expenditure contracted for at balance date for which no amounts, Santos Ltd.2003 $million = . have been provided in the financial statements:, Consolidated.2004 $million = . have been provided in the financial statements:, Consolidated.2003 $million = . have been provided in the financial statements:, Santos Ltd.2004 $million = . have been provided in the financial statements:, Santos Ltd.2003 $million = . Due not later than one year, Consolidated.2004 $million = 253.5. Due not later than one year, Consolidated.2003 $million = 237.7. Due not later than one year, Santos Ltd.2004 $million = 93.9. Due not later than one year, Santos Ltd.2003 $million = 84.3. Due later than one year but not later than five years, Consolidated.2004 $million = 13.4. Due later than one year but not later than five years, Consolidated.2003 $million = 33.2. Due later than one year but not later than five years, Santos Ltd.2004 $million = 8.2. Due later than one year but not later than five years, Santos Ltd.2003 $million = 0.2. , Consolidated.2004 $million = 266.9. , Consolidated.2003 $million = 270.9. , Santos Ltd.2004 $million = 102.1. , Santos Ltd.2003 $million = 84.5. Santos Ltd has guaranteed the capital commitments of certain controlled entities", - "page_start": 83, - "page_end": 83, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "FIRST RETAIL GAS SALES WITH SANTOS DIRECT\nAs well as selling gas into the wholesale gas market, Santos secured a retail gas licence from the Victorian Government in 2004. This allows Santos to sell gas direct to industrial customers and into the Victorian spot market through a wholly-owned\nsubsidiary, Santos Direct Pty Ltd ('Santos Direct').\nSantos Direct will market Santos' 10% share of gas production from the Minerva field - around 15 TJ/d - in the offshore Otway Basin, which commenced production at the end of 2004.\nThe move to market and sell gas directly into the Victorian retail market is a first for Santos and leverages off Santos' position as one of Australia's largest gas producers, supplying wholesale gas to major industrial customers and specialist marketers in all mainland Australian states and territories.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Other Transactions with the Company or its Controlled Entities\nAmounts received or due and receivable by the auditors of Santos Ltd for:, Consolidated.2004 $000 = . Amounts received or due and receivable by the auditors of Santos Ltd for:, Consolidated.2003 $000 = . Amounts received or due and receivable by the auditors of Santos Ltd for:, Santos Ltd.2004 $000 = . Amounts received or due and receivable by the auditors of Santos Ltd for:, Santos Ltd.2003 $000 = . External audit services, Consolidated.2004 $000 = 715. External audit services, Consolidated.2003 $000 = 649. External audit services, Santos Ltd.2004 $000 = 388. External audit services, Santos Ltd.2003 $000 = 363. Other services:, Consolidated.2004 $000 = . Other services:, Consolidated.2003 $000 = . Other services:, Santos Ltd.2004 $000 = . Other services:, Santos Ltd.2003 $000 = . Taxation, Consolidated.2004 $000 = 147. Taxation, Consolidated.2003 $000 = 112. Taxation, Santos Ltd.2004 $000 = -. Taxation, Santos Ltd.2003 $000 = -. Due diligence, Consolidated.2004 $000 = 3. Due diligence, Consolidated.2003 $000 = 23. Due diligence, Santos Ltd.2004 $000 = 58. Due diligence, Santos Ltd.2003 $000 = -. Other, Consolidated.2004 $000 = 9. Other, Consolidated.2003 $000 = 16. Other, Santos Ltd.2004 $000 = 6. Other, Santos Ltd.2003 $000 = 10. , Consolidated.2004 $000 = 874. , Consolidated.2003 $000 = 800. , Santos Ltd.2004 $000 = 452. , Santos Ltd.2003 $000 = 373. The auditors ceased providing taxation services from 31 December 2004., Consolidated.2004 $000 = The auditors ceased providing taxation services from 31 December 2004.. The auditors ceased providing taxation services from 31 December 2004., Consolidated.2003 $000 = The auditors ceased providing taxation services from 31 December 2004.. The auditors ceased providing taxation services from 31 December 2004., Santos Ltd.2004 $000 = The auditors ceased providing taxation services from 31 December 2004.. The auditors ceased providing taxation services from 31 December 2004., Santos Ltd.2003 $000 = The auditors ceased providing", - "page_start": 81, - "page_end": 81, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\namortisation, Consolidated.2004 $million = (156.2). Less accumulated amortisation, Consolidated.2003 $million = (151.7). Less accumulated amortisation, Santos Ltd.2004 $million = -. Less accumulated amortisation, Santos Ltd.2003 $million = -. , Consolidated.2004 $million = 4.0. , Consolidated.2003 $million = 8.5. , Santos Ltd.2004 $million = -. , Santos Ltd.2003 $million = -. 14. Payables, Consolidated.2004 $million = . 14. Payables, Consolidated.2003 $million = . 14. Payables, Santos Ltd.2004 $million = . 14. Payables, Santos Ltd.2003 $million = . Trade creditors, Consolidated.2004 $million = 278.9. Trade creditors, Consolidated.2003 $million = 242.6. Trade creditors, Santos Ltd.2004 $million = 109.5. Trade creditors, Santos Ltd.2003 $million = 95.3. Sundry creditors and accruals, Consolidated.2004 $million = 92.7. Sundry creditors and accruals, Consolidated.2003 $million = 48.7. Sundry creditors and accruals, Santos Ltd.2004 $million = 28.4. Sundry creditors and accruals, Santos Ltd.2003 $million = 18.4. Amounts owing to controlled entities, Consolidated.2004 $million = -. Amounts owing to controlled entities, Consolidated.2003 $million = -. Amounts owing to controlled entities, Santos Ltd.2004 $million = 298.4. Amounts owing to controlled entities, Santos Ltd.2003 $million = 541.3. , Consolidated.2004 $million = 371.6. , Consolidated.2003 $million = 291.3. , Santos Ltd.2004 $million = 436.3. , Santos Ltd.2003 $million = 655.0\nAnnual Report 2004\n59\n60\nfor the year ended 31 December 2004", - "page_start": 60, - "page_end": 61, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\n171.7. , Santos Ltd.2004 $million = 1,917.7. , Santos Ltd.2003 $million = . The interest-bearing amounts owing by controlled entities are for loans made in the, Consolidated.2004 $million = . The interest-bearing amounts owing by controlled entities are for loans made in the, Consolidated.2003 $million = . The interest-bearing amounts owing by controlled entities are for loans made in the, Santos Ltd.2004 $million = . The interest-bearing amounts owing by controlled entities are for loans made in the, Santos Ltd.2003 $million = . 8. Inventories, Consolidated.2004 $million = . 8. Inventories, Consolidated.2003 $million = . 8. Inventories, Santos Ltd.2004 $million = . 8. Inventories, Santos Ltd.2003 $million = . Petroleum products, Consolidated.2004 $million = 82.4. Petroleum products, Consolidated.2003 $million = 73.7. Petroleum products, Santos Ltd.2004 $million = 44.8. Petroleum products, Santos Ltd.2003 $million = 35.9. Drilling and maintenance stocks, Consolidated.2004 $million = 44.4. Drilling and maintenance stocks, Consolidated.2003 $million = 45.9. Drilling and maintenance stocks, Santos Ltd.2004 $million = 16.1. Drilling and maintenance stocks, Santos Ltd.2003 $million = 18.9. Less provision for obsolescence, Consolidated.2004 $million = (9.5). Less provision for obsolescence, Consolidated.2003 $million = (7.2). Less provision for obsolescence, Santos Ltd.2004 $million = (2.1). Less provision for obsolescence, Santos Ltd.2003 $million = (1.6). , Consolidated.2004 $million = 117.3. , Consolidated.2003 $million = 112.4. , Santos Ltd.2004 $million = 58.8. , Santos Ltd.2003 $million = 53.2. 9. Other Assets, Consolidated.2004 $million = . 9. Other Assets, Consolidated.2003 $million = . 9. Other Assets, Santos Ltd.2004 $million = . 9. Other Assets, Santos Ltd.2003 $million = . Current, Consolidated.2004 $million = . Current, Consolidated.2003 $million = . Current, Santos Ltd.2004 $million = . Current, Santos Ltd.2003 $million = . Prepayments, Consolidated.2004", - "page_start": 59, - "page_end": 59, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "How have been confirmed nonvanishing neutrino ?", - "target_page": 2, - "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "I. INTRODUCTION\nThe nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model. The most attractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in which the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. The minimal gauged U (1) B -L model based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B -L [2] is an elegant and simple extension of the SM, in which the RH neutrinos of three generations are necessarily introduced because of the gauge and gravitational anomaly cancellations. In addition, the mass of RH neutrinos arises associated with the U (1) B -L gauge symmetry breaking.\nAlthough the scale of the B -L gauge symmetry breaking is basically arbitrary as long as phenomenological constraints are satisfied, one interesting option is to take it to be the TeV scale [3]. It has been recently pointed out [4] that when the classical conformal invariance is imposed on the minimal U (1) B -L model, the symmetry breaking scale appears to be the TeV scale naturally. If this is the case, all new particles, the Z ' gauge boson, the B -L Higgs boson H and the RH neutrinos appear at the TeV scale unless the U (1) B -L gauge coupling is extremely small, and they can be discovered at Large Hadron Collider [5-8]. Then we may be able to understand the relation between the gauge symmetry breaking and the origin of neutrino masses.", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" - }, - { - "text": "IV. SUMMARY\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal gauged U (1) B -L model. We have introduced a discrete Z 2 parity in the model, so that one RH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other two RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. No additional degrees of freedom are necessary to be added. We have evaluated the relic density of the dark matter particle. The dominant annihilation modes are via the Higgs boson exchange processes in the s -channel and thus, our model can be called Higgs portal DM model. It has been found that the relic density consistent with the current observation\n8\ncan be achieved only when the annihilation processes are enhanced by Higgs resonances. Therefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. We have also calculated the elastic scattering cross section between the DM particle and a proton and found it within the reach of future experiments for the direct DM search.", - "page_start": 7, - "page_end": 8, - "source_file": "1002.2525.pdf" - }, - { - "text": "I. INTRODUCTION\nAlthough such a TeV scale model is interesting and appealing, one might think that the absence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino with mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple idea to introduce the DM candidate in the minimal gauged U (1) B -L model. We introduce the Z 2 parity into the model and impose one of three RH neutrinos to be odd, while the others even. In this way, the Z 2 -odd RH neutrino becomes stable and the DM candidate. Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation data, with a prediction of one massless light neutrino. Therefore, without introducing any additional new dynamical degrees of freedom, the DM particle arises in the minimal gauged U (1) B -L model.\nThe paper is organized as follows. In the next section, we briefly describe our model. In section III, we estimate the thermal relic density of the RH neutrino and identify the model\n2\nparameter to be consistent with the current observations. We also calculate the scattering cross section between the DM particle and nucleon and discuss the implication for the direct DM search experiments. We summarize our results in the section IV. Our notations and the formulas used in our analysis are listed in Appendix.", - "page_start": 1, - "page_end": 2, - "source_file": "1002.2525.pdf" - }, - { - "text": "A. Thermal relic density\nThe DM RH neutrino interacts with the SM particles through couplings with B -L gauge and B -L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent because of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z ' , H and h exchange processes in the s -channel. In practice, the dominant contributions come from the Higgs ( h and H ) exchange diagrams, because the Z ' exchange processes are suppressed by the inverse square of the B -L Higgs VEV v ' /greaterorsimilar 3 TeV. Thus, we obtain Higgs portal DM of RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯ f , W + W -, ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B -L Higgs Ψ while a SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing between these two Higgs bosons. Although it is not so severe, the precision electroweak measurements [12] as well as the unitarity bound [13] give constraints on the mixing angle and mass spectrum of the Higgs bosons.\nThe thermal relic abundance of DM\nΩ N h 2 = 1 . 1 × 10 9 m N /T d √ g ∗ M P 〈 σv 〉 GeV -1 , (14)\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section and the relative velocity 〈 σv 〉 , the total number of relativistic degrees of freedom in the thermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann equation for the number density of RH neutrino n N ;\ndn N dt +3 Hn N = -〈 σv 〉 ( n 2 N -n 2 EQ ) , (15)\nand the Friedmann equation\nH 2 ≡ ( ˙ a a ) 2 = 8 π 3 M 2 P ρ, (16)\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the radiation dominated Universe with the energy density ρ = ρ rad [14].\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "Abstract\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal gauged U (1) B -L model by introducing an additional parity which ensures the stability of dark matter particle. The annihilation of this right-handed neutrino takes place dominantly through the s -channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model. We show that the thermal relic abundance of the right-handed neutrino dark matter with help of Higgs resonance can match the observed dark matter abundance. In addition we estimate the cross section with nucleon and show that the next generation direct dark matter search experiments can explore this model.\nPACS numbers:\n∗ Electronic address: okadan@ua.edu\n† Electronic address: seto@phyics.umn.edu", - "page_start": 0, - "page_end": 0, - "source_file": "1002.2525.pdf" - }, - { - "text": "III. RIGHT-HANDED NEUTRINO DARK MATTER\nDue to the Z 2 parity, one of RH neutrino N 3 (we denote it as N hereafter) in our model can be the DM candidate. We first estimate its relic abundance and identify the model\n4\nparameters to be consistent with the current observations. Next we calculate the scattering cross section between the DM particle and a proton and discuss the implication for the direct DM search experiments.", - "page_start": 3, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "II. THE MINIMAL GAUGED U (1) B -L MODEL WITH Z 2 PARITY\nThe model is based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B -L . Additional fields besides the standard model fields are a gauge field Z ' µ of the U (1) B -L , a SM singlet B -L Higgs boson Ψ with two U (1) B -L charge, and three RH neutrinos N i which are necessary for the gauge and gravitational anomaly cancellations. In describing the RH neutrinos, we use the four component representation of RH neutrino constructed from the Weyl spinor ν R i ,\nN i ≡   ν R i /epsilon1 ν ∗ R i   , (1)\nFor the two RH neutrinos, N 1 and N 2 , we assign Z 2 parity even, while odd for N 3 , so that the RH neutrino N 3 is stable and, hence, the DM candidate.\nDue to the additional gauge symmetry U (1) B -L , the covariant derivative for each fields is given by\nD µ = D ( SM ) µ -iq B -L g B -L Z ' µ , (2)\nwhere D ( SM ) µ is the covariant derivative in the SM, and q B -L is the charge of each fields under the U (1) B -L with its gauge coupling g B -L .\nYukawa interactions relevant for the neutrino masses are given by\nL int = 3 ∑ α =1 2 ∑ i =1 y αi ¯ L α ˜ Φ N i -1 2 3 ∑ i =1 λ R i ¯ N i Ψ P R N i +h . c ., (3)\nwhere ˜ Φ = -iτ 2 Φ ∗ for Φ being the SM Higgs doublet, and without loss of generality we have worked out in the basis where the second term in the right-hand-side is in flavor diagonal for RH neutrinos. Because of the Z 2 parity, the DM candidate N 3 has no Yukawa couplings with the left-handed lepton doublets.\nThe general Higgs potential for the SU (2) L doublet Φ and a singlet B -L Higgs Ψ is generally given by", - "page_start": 2, - "page_end": 2, - "source_file": "1002.2525.pdf" - }, - { - "text": "II. THE MINIMAL GAUGED U (1) B -L MODEL WITH Z 2 PARITY\nV (Φ , Ψ) = m 2 1 | Φ | 2 + m 2 2 | Ψ | 2 + λ 1 | Φ | 4 + λ 2 | Ψ | 4 + λ 3 | Φ | 2 | Ψ | 2 . (4)\n3\nThe Higgs fields φ and ψ are obtained by expanding Φ and Ψ as\nΦ =   0 1 √ 2 ( v + φ )   , (5)\nΨ = 1 √ 2 ( v ' + ψ ) , (6)\naround the true vacuum with the vacuum expectation values v and v ' . These are related with the mass eigenstates h and H through\n  h H   =   cos θ -sin θ sin θ cos θ     φ ψ   , (7)\nwith θ being the mixing angle. Their masses are given by\nM 2 h = 2 λ 1 v 2 cos 2 θ +2 λ 2 v ' 2 sin 2 θ -2 λ 3 vv ' sin θ cos θ, (8)\nM 2 H = 2 λ 1 v 2 sin 2 θ +2 λ 2 v ' 2 cos 2 θ +2 λ 3 vv ' sin θ cos θ. (9)\nThe mass of the new neutral gauge boson Z ' arises by the U (1) B -L gauge symmetry breaking,\nM 2 Z ' = 4 g 2 B -L v ' 2 . (10)\nAssociated with the U (1) B -L gauge symmetry breaking, the RH neutrinos N i acquire masses\nM N i = -λ R i v ' √ 2 . (11)\nFrom LEP experiment, the current lower bound on the Z ' boson mass has been found to be [10, 11]\nM Z ' g B -L = 2 v ' /greaterorsimilar 6 -7 TeV . (12)\nTwo Z 2 -even RH neutrinos N 1 and N 2 are responsible for light neutrino masses via the seesaw mechanism,\nm ν αβ = -∑ i =1 , 2 y αi y iβ v 2 2 M N i . (13)\nNote that the rank of this mass matrix is two, so that the lightest neutrino is massless.", - "page_start": 2, - "page_end": 3, - "source_file": "1002.2525.pdf" - }, - { - "text": "Appendix B: Amplitude\nWe give explicit formulas of the invariant amplitude squared for the pair annihilation processes of the RH neutrinos.", - "page_start": 9, - "page_end": 9, - "source_file": "1002.2525.pdf" - }, - { - "text": "References\n[58] Wang C, Gu L, Ruan Y, Geng X, Xu M, Yang N, Yu L, Jiang Y, Zhu C, Yang Y, Zhou Y, Guan X, Luo W, Liu Q, Dong X, Yu G, Lan L, Tang Z. Facilitation of MrgprD by TRP-A1 promotes neuropathic pain. FASEB J 2019;33: 1360-73.\n[59] Wang H, Zylka MJ. Mrgprd-expressing polymodal nociceptive neurons innervate most known classes of substantia gelatinosa neurons. J Neurosci 2009;29:13202-9.\n[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial cell line-derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and prevents the expression of experimental neuropathic pain. Neuroscience 2003; 121:815-24.\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan fluorescent protein (CFP) expressing cells in the retina of Thy1-CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010; 468:110-4.\n[62] Warwick C, Cassidy C, Hachisuka J, Wright MC, Baumbauer KM, Adelman PC, Lee KH, Smith KM, Sheahan TD, Ross SE, Koerber HR. MrgprdCre lineage neurons mediate optogenetic allodynia through an emergent polysynaptic circuit. PAIN 2021;162:2120-31.\n[63] Weir GA, Middleton SJ, Clark AJ, Daniel T, Khovanov N, McMahon SB, Bennett DL. Using an engineered glutamate-gated chloride channel to silence sensory neurons and treat neuropathic pain at the source. Brain 2017;140:2570-85.\n[64] Welin D, Novikova LN, Wiberg M, Kellerth JO, Novikov LN. Survival and regeneration of cutaneous and muscular afferent neurons after peripheral nerve injury in adult rats. Exp Brain Res 2008;186:315-23.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "What are the dominant contributions in thermal relic density ?", - "target_page": 5, - "target_passage": "In practice, the dominant contributions come from the Higgs (h and H) exchange diagrams.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "A. Thermal relic density\nmode into W -boson pair becomes kinematically available, it is not possible to obtain the desired DM abundance without the Higgs resonant annihilation because the bound on v ' given by Eq. (12) is stringent.", - "page_start": 6, - "page_end": 6, - "source_file": "1002.2525.pdf" - }, - { - "text": "A. Thermal relic density\nFig. 1 shows the relic density Ω N h 2 as a function of the DM mass m N for a set of parameters: ( v ' , M h , M H , M Z ' , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for example. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as Ω DM h 2 /similarequal 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for only near Higgs resonances, m N ≈ M h / 2 or M H / 2.\nFig. 2 shows the relic density Ω N h 2 as a function of the DM mass m N for a smaller Higgs mixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N /lessorsimilar M W where the DM particles dominantly annihilate into f ¯ f , the relic density further increases because of the small mixing angle. When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases, but the reduction is not enough to reach Ω N h 2 /similarequal 0 . 1.\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter set: ( v ' , M h , M H , M Z ' , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16-18]. Some recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the thermal abundance is mainly controlled by the interactions between the SM Higgs boson and the DM particle. In our model, B -L Higgs VEV v ' can play the same role for m N < M W , namely a larger v ' corresponds to weaker coupling between DM and Higgs for a fixed DM mass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n6\nFIG. 2: The same as Fig. 1 but for sin θ = 0 . 3.", - "page_start": 5, - "page_end": 6, - "source_file": "1002.2525.pdf" - }, - { - "text": "A. Thermal relic density\nThe DM RH neutrino interacts with the SM particles through couplings with B -L gauge and B -L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent because of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z ' , H and h exchange processes in the s -channel. In practice, the dominant contributions come from the Higgs ( h and H ) exchange diagrams, because the Z ' exchange processes are suppressed by the inverse square of the B -L Higgs VEV v ' /greaterorsimilar 3 TeV. Thus, we obtain Higgs portal DM of RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯ f , W + W -, ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B -L Higgs Ψ while a SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing between these two Higgs bosons. Although it is not so severe, the precision electroweak measurements [12] as well as the unitarity bound [13] give constraints on the mixing angle and mass spectrum of the Higgs bosons.\nThe thermal relic abundance of DM\nΩ N h 2 = 1 . 1 × 10 9 m N /T d √ g ∗ M P 〈 σv 〉 GeV -1 , (14)\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section and the relative velocity 〈 σv 〉 , the total number of relativistic degrees of freedom in the thermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann equation for the number density of RH neutrino n N ;\ndn N dt +3 Hn N = -〈 σv 〉 ( n 2 N -n 2 EQ ) , (15)\nand the Friedmann equation\nH 2 ≡ ( ˙ a a ) 2 = 8 π 3 M 2 P ρ, (16)\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the radiation dominated Universe with the energy density ρ = ρ rad [14].\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "IV. SUMMARY\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal gauged U (1) B -L model. We have introduced a discrete Z 2 parity in the model, so that one RH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other two RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. No additional degrees of freedom are necessary to be added. We have evaluated the relic density of the dark matter particle. The dominant annihilation modes are via the Higgs boson exchange processes in the s -channel and thus, our model can be called Higgs portal DM model. It has been found that the relic density consistent with the current observation\n8\ncan be achieved only when the annihilation processes are enhanced by Higgs resonances. Therefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. We have also calculated the elastic scattering cross section between the DM particle and a proton and found it within the reach of future experiments for the direct DM search.", - "page_start": 7, - "page_end": 8, - "source_file": "1002.2525.pdf" - }, - { - "text": "Abstract\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal gauged U (1) B -L model by introducing an additional parity which ensures the stability of dark matter particle. The annihilation of this right-handed neutrino takes place dominantly through the s -channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model. We show that the thermal relic abundance of the right-handed neutrino dark matter with help of Higgs resonance can match the observed dark matter abundance. In addition we estimate the cross section with nucleon and show that the next generation direct dark matter search experiments can explore this model.\nPACS numbers:\n∗ Electronic address: okadan@ua.edu\n† Electronic address: seto@phyics.umn.edu", - "page_start": 0, - "page_end": 0, - "source_file": "1002.2525.pdf" - }, - { - "text": "Ambient air temperature\n=Standard sea level air temperature @=TITtl ,+273 288\nMany items of compressibility effects and jet engine performance involve consideration of the temperature ratio.\nDENSITY. The density of the air is a property of greatest importance in the study of aerodynamics. The density of air is simply the mass of air per~cubic foot of volume and is a direct measure of the quantity of matter in each cubic foot of air. Air at standard sea lcvcl conditions weighs 0.0765 pounds per cubic foot and has a density of 0.002378 slugs per cubic foot. At an altitude of 40,000 feet the air density is approximately 25 percent of the sea level value.\nThe shorthand notation used for air density is p (rho) and the standard sea level air density is then pO. In many parts of aerodynamics it is very convenient to consider the proportion of the ambient air density and standard sea level air density. This density ratio is assigned the shorthand notation of c (sigma).\ndensity ratio= ambient air density standard sea level air density a = PIP0\nA general gas law defines the relationship of pressure temperature, and density when there is no change of state or heat transfer. Simply stated this would be 'density varies directly with pressure, inversely with temperature.' Using the properties previously defined,\ndensity ratio= Pressure rat'o. temperature rat10\nPlAVWEPS 00-8OT-80 BASIC AERODYNAMICS\nThis relationship has great application in aerodynamics and is quite fundamental and necessary in certain parts of airplane performance.\nVISCOSITY. The viscosity of the air is important in scale and friction effects. The coefficient of absolute viscosity is the proportion between the shearing stress and velocity gradient for a fluid flow. The viscosity of gases is unusual in that the viscosity is generally a function of temperature alone and an increase in temperature increases the viscosity. The coefficient of absolute viscosity is assigned the shorthand notation I, (mu). Since many parts of aerodynamics involve consideration of viscosity and density, a more usual form of viscosity measure is the proportion of the coefficient of absolute viscosity and density. This combination is termed the 'kinematic viscosity' and is noted by Y (nu).\nkinematic viscosity\ncoefficient of absolute viscosity\ncc density\nv=PlP", - "page_start": 19, - "page_end": 21, - "source_file": "00-80T-80.pdf" - }, - { - "text": "III. MODELLING APPROACHES\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its potential applications. For instance, the thermodynamic chemical potential as well as any wetting interaction of the solvent with the substrate are collected in a single parameter - an effective chemical potential. This implies that any influence of a disjoining pressure is 'smeared out' over the whole system and that no distinction between the short- and the long-range parts of the disjoining pressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n8\nthe dominant dynamic process, but does not allow one to probe this assumption. In Section III B we show how one may develop a dynamical density functional theory (DDFT) that describes the system at a similar level to the KMC. However, the DDFT may also be easily extended to include other effects such as fluid diffusion, that the KMC does not incorporate.", - "page_start": 7, - "page_end": 8, - "source_file": "1001.2669.pdf" - }, - { - "text": "4.3 OpenShift persistent storage\nBecause Plain Docker storage is not shared between nodes, it is not enough for container service availability because pods might be stopped on one node and restarted on another node at any time. If a database pod is stopped and restarted on another node, any stored data is lost.\nKubernetes provides a framework for managing external persistent storage for containers. Kubernetes recognizes a PersistentVolume resource, which can be defined as local or network storage. A pod resource can reference a PersistentVolumeClaim resource to access storage of a certain size from a PersistentVolume.\nKubernetes also specifies whether a PersistentVolume resource can be shared between pods or if each pod needs its own PersistentVolume with exclusive access. When a pod moves to another node, it stays connected to the same PersistentVolumeClaim and PersistentVolume instances. Therefore, a pod's persistent storage data follows it, regardless of the node where it is scheduled to run.\nOpenShift adds several VolumeProviders to Kubernetes, which provide access to enterprise storage, such as iSCSI, Fibre Channel, Gluster, or a cloud block volume service, such as OpenStack Cinder.\nOpenShift also provides dynamic provisioning of storage for applications by way of the StorageClass resource. By using dynamic storage, you can select different types of back-end storage. The back-end storage is segregated into different tiers, depending on the needs of your application.\nFor example, a cluster administrator can define a StorageClass with the name of 'fast,' which uses higher-quality back-end storage, and another StorageClass called 'slow,' which provides commodity-grade storage.\nWhen requesting storage, a user can specify a PersistentVolumeClaim with an annotation that specifies the value of the StorageClass that they prefer.", - "page_start": 83, - "page_end": 83, - "source_file": "sg248459.pdf" - }, - { - "text": "Reciprocating powered airplane\n(1) Pressure altitude and temperatureto define the effect of density altitude on distance.\n(2) Gross weight-a large effect on distance.\n(3) Specific humidity-to correct cakeoff distance for the power loss associated with water vapor.\n(4) Wind-a large effect due to the wind or wind component along the runway. Turbine powered airplane\n(I) Pressure altitude and temperatureto define the effect of density altitude.\n192\n(2) Gross weight.\n(3) Temperature--an additional correction for nonstandard temperatures to account for the thrust loss associated with high compressor inlet air temperature. For this correction the ambient temperature at the runway conditions is appropriate rather than the ambient temperature at some distant location.", - "page_start": 209, - "page_end": 209, - "source_file": "00-80T-80.pdf" - }, - { - "text": "HEARTH & HOME TECHNOLOGIES AT-A-GLANCE\nSince the first air-circulating fireplace was patented in 1927, Heatilator ® has become the most recognized and preferred fireplace brand among homebuilders. Heatilator Home Products TM extends our business beyond the hearth to include products that enhance a healthy home environment.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "What happend to the annihilation and the relic density when the DM is heavier ?", - "target_page": 6, - "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "A. Thermal relic density\nmode into W -boson pair becomes kinematically available, it is not possible to obtain the desired DM abundance without the Higgs resonant annihilation because the bound on v ' given by Eq. (12) is stringent.", - "page_start": 6, - "page_end": 6, - "source_file": "1002.2525.pdf" - }, - { - "text": "A. Thermal relic density\nFig. 1 shows the relic density Ω N h 2 as a function of the DM mass m N for a set of parameters: ( v ' , M h , M H , M Z ' , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for example. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as Ω DM h 2 /similarequal 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for only near Higgs resonances, m N ≈ M h / 2 or M H / 2.\nFig. 2 shows the relic density Ω N h 2 as a function of the DM mass m N for a smaller Higgs mixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N /lessorsimilar M W where the DM particles dominantly annihilate into f ¯ f , the relic density further increases because of the small mixing angle. When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases, but the reduction is not enough to reach Ω N h 2 /similarequal 0 . 1.\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter set: ( v ' , M h , M H , M Z ' , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16-18]. Some recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the thermal abundance is mainly controlled by the interactions between the SM Higgs boson and the DM particle. In our model, B -L Higgs VEV v ' can play the same role for m N < M W , namely a larger v ' corresponds to weaker coupling between DM and Higgs for a fixed DM mass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n6\nFIG. 2: The same as Fig. 1 but for sin θ = 0 . 3.", - "page_start": 5, - "page_end": 6, - "source_file": "1002.2525.pdf" - }, - { - "text": "IV. SUMMARY\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal gauged U (1) B -L model. We have introduced a discrete Z 2 parity in the model, so that one RH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other two RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. No additional degrees of freedom are necessary to be added. We have evaluated the relic density of the dark matter particle. The dominant annihilation modes are via the Higgs boson exchange processes in the s -channel and thus, our model can be called Higgs portal DM model. It has been found that the relic density consistent with the current observation\n8\ncan be achieved only when the annihilation processes are enhanced by Higgs resonances. Therefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. We have also calculated the elastic scattering cross section between the DM particle and a proton and found it within the reach of future experiments for the direct DM search.", - "page_start": 7, - "page_end": 8, - "source_file": "1002.2525.pdf" - }, - { - "text": "A. Thermal relic density\nThe DM RH neutrino interacts with the SM particles through couplings with B -L gauge and B -L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent because of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z ' , H and h exchange processes in the s -channel. In practice, the dominant contributions come from the Higgs ( h and H ) exchange diagrams, because the Z ' exchange processes are suppressed by the inverse square of the B -L Higgs VEV v ' /greaterorsimilar 3 TeV. Thus, we obtain Higgs portal DM of RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯ f , W + W -, ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B -L Higgs Ψ while a SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing between these two Higgs bosons. Although it is not so severe, the precision electroweak measurements [12] as well as the unitarity bound [13] give constraints on the mixing angle and mass spectrum of the Higgs bosons.\nThe thermal relic abundance of DM\nΩ N h 2 = 1 . 1 × 10 9 m N /T d √ g ∗ M P 〈 σv 〉 GeV -1 , (14)\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section and the relative velocity 〈 σv 〉 , the total number of relativistic degrees of freedom in the thermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann equation for the number density of RH neutrino n N ;\ndn N dt +3 Hn N = -〈 σv 〉 ( n 2 N -n 2 EQ ) , (15)\nand the Friedmann equation\nH 2 ≡ ( ˙ a a ) 2 = 8 π 3 M 2 P ρ, (16)\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the radiation dominated Universe with the energy density ρ = ρ rad [14].\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "III. RIGHT-HANDED NEUTRINO DARK MATTER\nDue to the Z 2 parity, one of RH neutrino N 3 (we denote it as N hereafter) in our model can be the DM candidate. We first estimate its relic abundance and identify the model\n4\nparameters to be consistent with the current observations. Next we calculate the scattering cross section between the DM particle and a proton and discuss the implication for the direct DM search experiments.", - "page_start": 3, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "Turning off data retention protection\nWhen you turn off data retention protection, the following descriptions explain what happens when you use the creation-based object expiration policy and the event-based retention object expiration policy:\n/SM590000 Creation-based object expiration policy: Content Manager OnDemand issues a delete object command through the Tivoli Storage Manager API. Objects are deleted during the next inventory expiration. If a Content Manager OnDemand application group is deleted, a delete filespace command is issued instead, and the objects are immediately deleted with the file space.\n/SM590000 Event-based retention object expiration policy: Content Manager OnDemand issues an event trigger command through the Tivoli Storage Manager API. The status of the objects that are affected changes from PENDING to STARTED , and the objects are expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire. If a Content Manager OnDemand application group is deleted, a delete filespace command is issued instead, and the objects are immediately deleted with the file space.", - "page_start": 258, - "page_end": 258, - "source_file": "sg246915.pdf" - }, - { - "text": "Turning on data retention protection\nWhen you turn on data retention protection, the following descriptions explain what happens when you use creation-based object expiration policy and event-based retention object expiration policy:\n/SM590000 Creation-based object expiration policy: Content Manager OnDemand issues no commands to Tivoli Storage Manager. The objects are effectively orphaned by Content Manager OnDemand and are expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire.\n/SM590000 Event-based retention object expiration policy: Content Manager OnDemand issues an event trigger command through the Tivoli Storage Manager API. The event status of the objects that are affected is changed from PENDING to STARTED, and the affected objects are expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire.\nIf a Content Manager OnDemand application group is deleted, a delete filespace command cannot be used with data retention protection; the operation is treated the same as though a delete is indicated. The status of all of the affected objects is changed from PENDING to STARTED, and the affected objects are expired by Tivoli Storage Manager based on their retention parameters. This action leaves the file space entries in Tivoli Storage Manager, so you must manually delete these entries when the file space is empty (even with data retention protection on).", - "page_start": 258, - "page_end": 258, - "source_file": "sg246915.pdf" - }, - { - "text": "10.2 Loading and storing the data\nThe Content Manager OnDemand architecture allows the control and management of the data throughout its lifecycle. The data lifecycle begins with running an efficient load process. Each load process invocation ingests report data for a specified application group.\nDuring a load process, Content Manager OnDemand stores report (document) data, its resources, and index data, as shown in Figure 10-1.\nFigure 10-1 Data and index storage locations\nThe Content Manager OnDemand load process identifies, segments, and compresses groups of documents into storage objects that are then stored in the Content Manager OnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage process, Content Manager OnDemand aggregates the stored documents (typically a few kilobytes in size) into storage objects. This aggregation provides efficient, high-volume storage, retrieval, and expiration performance.\n220\nIBM Content Manager OnDemand Guide\nThe object size is defined by clicking Advanced on the Storage Manager tab of the Application Group window. The object size is the size of a storage object in kilobytes (KB). By default, Content Manager OnDemand segments and compresses report data into 10 MB storage objects. For most use cases, the default value is appropriate. Valid values are 1 KB - 150 MB.\nObject size value: Exercise caution when you change the object size value. Specifying too large or too small a value can adversely affect performance when you load data.\nThe storage objects are stored in storage sets . The storage sets contain one or more primary storage nodes . The storage node points to the location where the data is stored, which can be cache, the storage manager (Tivoli Storage Manager, object access method (OAM), or Archive Storage Manager (ASM)), or a combination.\nThe primary storage nodes can be on one or more object servers. When the Load Type is Local , Content Manager OnDemand loads data on the server on which the data loading program runs in the primary storage node with the Load Data property specified. If the Load Type is Local , and the storage set contains primary nodes on different object servers, you must select the Load Data check box for one primary node on each object server.", - "page_start": 243, - "page_end": 244, - "source_file": "sg246915.pdf" - }, - { - "text": "Important notes :\n/SM590000 Data retention protection is permanent . After it is turned on, it cannot be turned off.\n/SM590000 Content Manager OnDemand does not support deletion on hold data. This feature prevents held data from being deleted until the hold is released.\nTivoli Storage Manager supports two retention policies:\n/SM590000 In creation-based retention , the policy becomes active when the data is stored (created) on the Tivoli Storage Manager server. This policy is the default retention policy method and it is used with normal backup/archive clients.\n/SM590000 In event-based retention , the policy becomes active when the client sends a retention event to the Tivoli Storage Manager server. The retention event can be sent to the server any time after the data is stored on the server. Until the retention event is received, the data is indefinitely stored on the Tivoli Storage Manager server. For Content Manager OnDemand, the retention event is the call to delete the data. A load, unload, application group delete, or expiration of data triggers the retention event.\nIf you decide to use these policies in Tivoli Storage Manager, the Content Manager OnDemand scenarios that are described in the rest of this section are supported.", - "page_start": 257, - "page_end": 257, - "source_file": "sg246915.pdf" - }, - { - "text": "10.6.1 Content Manager OnDemand expiration\nDisk Storage Management (DSM) is the process for performing Content Manager OnDemand based expiration. DSM performs the following functions:\n/SM590000 Controls the expiration of indexes and data from Content Manager OnDemand (if you do not use storage manager-based expiration).\n/SM590000 Migrates data from cache to the storage manager (if the Migrate Data from Cache option is not set to When data is loaded).\n/SM590000 Expires data from cache if Cache Data is set to Yes.\nIf you do not run DSM, your disk storage requirements for Content Manager OnDemand might be higher than expected. The number of objects that are stored in the integrated file system (IFS) might also be higher than necessary, which results in longer save and restore times.\nNote: If you have never run DSM, the first execution of the Start Disk Storage Management ( STRDSMOND ) command might last for an extended period.\nIf you want to configure Content Manager OnDemand so that DSM is not required in the future, see the section 'Eliminating the need to run Disk Storage Manager (DSM)' in the latest Content Manager OnDemand for i Common Server Administration Guide , SC19-2792.\nChapter 10. Migration and expiring data and indexes\n239", - "page_start": 262, - "page_end": 262, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is the aim of LLM routers ?", - "target_page": 1, - "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "2 LLMControl Planes and Routing\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or sequence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, with API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at different tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple LLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual LLMs plateaus [8-10].\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer queries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from networking [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to underlying LLMs, combine answers from underlying LLMs, and more.\nLLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. LLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, the router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a response. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure a score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative workloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response to return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a cascade, stopping when it obtains a response classified by the router as sufficient.\n2\nIn contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].", - "page_start": 1, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "2 LLMControl Planes and Routing\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 × in the case of NotDiamond [7].", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "10 Conclusion\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call 'LLM control planes' that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n17\nWe introduced and defined a new safety property, LLM control plane integrity . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating queryindependent 'confounder gadgets.' When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.", - "page_start": 16, - "page_end": 17, - "source_file": "arxiv1.pdf" - }, - { - "text": "ABSTRACT\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. Routers represent one type of what we call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we investigate routers' adversarial robustness.\nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial inputs, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate queryindependent token sequences we call 'confounder gadgets' that, when added to any query, cause LLM routers to send the query to a strong LLM.\nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings against a variety of open-source and commercial routers, and that confounding queries do not affect the quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining low perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating alternative defenses.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "5 Open-Source Routers: Experimental Setup\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with several LLM routers. This section explains our experimental setup for the open-source routers proposed in the research literature [47]; results of this evaluation appear in Section 6. In Section 7, we discuss experiments with proprietary, commercial routers. Figure 3 shows the summary of our experimental setup.\n6\nFigure 3: Summary of our setup for routers, underlying LLMs, and benchmark datasets used in the experiments.", - "page_start": 5, - "page_end": 6, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nLLM pair 1, R MF = LLM pair 1. LLM pair 1, ˆ R SW R CLS = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R MF R CLS = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R CLS S FM = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R LLM R MF = LLM pair 1. LLM pair 1, R CLS = LLM pair 1. MT-Bench, R MF = - 0 . 1. MT-Bench, ˆ R SW R CLS = - 0 . 1. MT-Bench, R LLM = 0 . 0. MT-Bench, R SW = - 0 . 1. MT-Bench, ˆ R MF R CLS = - 0 . 1. MT-Bench, R LLM = 0 . 0. MT-Bench, R SW = - 0 . 1. MT-Bench, ˆ R CLS S FM = 0 . 0. MT-Bench, R LLM = 0 . 1. MT-Bench, R SW = - 0 . 2. MT-Bench, ˆ R LLM R MF = - 0 . 1. MT-Bench, R CLS = - 0 . 2. MMLU, R MF = - 0 . 1. MMLU, ˆ R SW R CLS = 0 . 3. MMLU, R LLM = - 0 . 2. MMLU, R SW = 4 . 8. MMLU, ˆ R MF R CLS = 1 . 0. MMLU, R LLM = 0 . 5. MMLU, R SW = 2 . 5. MMLU, ˆ R CLS S FM = - 1 . 3. MMLU, R LLM = - 0 . 8. MMLU, R SW = 2 . 6. MMLU, ˆ R LLM R MF = - 0 . 9. MMLU, R CLS = 0 . 3. GSM8K, R MF = 14 . 9.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" - }, - { - "text": "1 Introduction\nLarge language models (LLMs) exhibit remarkable capabilities on many tasks. Today, hundreds of open-source and proprietary LLMs are available at different prices, ranging from expensive, state-of-the-art models to cheaper, smaller, less capable ones. LLM operators typically provide API access to their models (especially higher-quality models) on a pay-per-query basis. This imposes non-trivial costs on LLM-based applications and systems.\nDevelopers who want to integrate LLMs into their applications must therefore consider both utility and cost. They want to maximize the quality of responses to their queries while minimizing the cost. The two objectives conflict with each other: larger models tend to generate higher-quality answers but charge more per query. For example, at the time of this writing, GPT-3.5-turbo costs $0 . 5 / $1 . 5 per 1M input/output tokens, GPT-4o-mini $0 . 15 / $0 . 6 , GPT-4o $2 . 5 / $10 , o1-preview $15 / $60 . The difference in quality between models is not uniform across queries. For some queries, even a cheap model can generate an acceptable response. More complex queries require an expensive model to obtain a quality answer.\nA natural solution to balancing performance and economic considerations is to take advantage of the availability of multiple LLMs at different price-performance points. Recently proposed LLM routing systems [5, 12, 27, 47, 53] orchestrate two or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of sufficient quality. In the two-LLM case, let M s be an expensive, high-quality model and M w a weaker, lower-grade one. Given query q , the routing algorithm R ( · ) applies a classifier to q that outputs 0 if M w is sufficient for answering q , or 1 if M s is required. The system then routes q accordingly.\nLLMrouting is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple LLMs to process inputs, as further described in Section 2.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nMF = 1 . 6. MMLU, ˆ R SW R CLS = 4 . 0. MMLU, R LLM = 4 . 2. MMLU, R SW = 7 . 9. MMLU, ˆ R MF R CLS = 5 . 0. MMLU, R LLM = 4 . 4. MMLU, R SW = 5 . 0. MMLU, ˆ R CLS S FM = - 2 . 9. MMLU, R LLM = 3 . 2. MMLU, R SW = 5 . 2. MMLU, ˆ R LLM R MF = - 0 . 9. MMLU, R CLS = 3 . 8. GSM8K, R MF = 13 . 6. GSM8K, ˆ R SW R CLS = 8 . 7. GSM8K, R LLM = 18 . 5. GSM8K, R SW = 18 . 9. GSM8K, ˆ R MF R CLS = 14 . 4. GSM8K, R LLM = 18 . 3. GSM8K, R SW = 13 . 1. GSM8K, ˆ R CLS S FM = 4 . 0. GSM8K, R LLM = 15 . 5. GSM8K, R SW = 11 . 3. GSM8K, ˆ R LLM R MF = 8 . 4. GSM8K, R CLS = 10 . 8. LLM pair 3, R MF = LLM pair 3. LLM pair 3, ˆ R SW R CLS = LLM pair 3. LLM pair 3, R LLM = LLM pair 3. LLM pair 3, R SW = LLM pair 3. LLM pair 3, ˆ R MF R CLS = LLM pair 3. LLM pair 3, R LLM = LLM pair 3. LLM pair 3, R SW = LLM pair 3. LLM pair 3, ˆ R CLS S FM = LLM pair 3. LLM pair 3, R LLM = LLM pair 3. LLM pair 3, R SW = LLM pair 3. LLM pair 3, ˆ R LLM R MF = LLM pair 3. LLM pair 3, R CLS = LLM pair 3. MT-Bench, R MF = 0 . 2. MT-Bench,", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" - }, - { - "text": "3 LLMControl Plane Integrity\nIn this section, we define LLM control plane integrity . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\nFormalizing control planes. An LLM control plane R ω is a potentially randomized algorithm. It is parameterized by a string ω , called the parameters. It utilizes some number n of LLMs denoted by M . We will mostly focus on the case of n = 2 , and, for reasons that will be clear in a moment, use M s ('strong') and M w ('weak') to denote the two underlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing a response via y ← $ R M ω ( x ) . Here we use ← $ to denote running R with fresh random coins; we use ← when R is deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of M s or M w should be used to respond to a query.\nInference flow. Given a set of LLMs M , a control plane R ω , and an input x , an LLM inference flow is the sequence of LLM invocations M i j ( z j ) for 1 ≤ j ≤ m and i j ∈ { w , s } made when executing R M ω ( x ) . Here m is the total number of LLM invocations, and z 1 , . . . , z m are the queries made to the underlying LLMs. Should R be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nTable 4: Average benchmark-specific scores of responses to the original and confounded queries with Mistral-7B-Instructv0.3 (LLM pair 2) or Llama-2-7B-chat-hf (LLM pair 3) as the weak model, in the white-box setting. Results further emphasize that the rerouting attack improves quality of responses when there is a significant gap between the weak and strong LLMs.\nGSM8K, R MF.Conf. = 67 ± 1. GSM8K, R CLS.Orig. = 49. GSM8K, R CLS.Conf. = 63 ± 1. GSM8K, R LLM.Orig. = 38. GSM8K, R LLM.Conf. = 63 ± 2. LLM pair 3, R SW.Orig. = LLM pair 3. LLM pair 3, R SW.Conf. = LLM pair 3. LLM pair 3, R MF.Orig. = LLM pair 3. LLM pair 3, R MF.Conf. = LLM pair 3. LLM pair 3, R CLS.Orig. = LLM pair 3. LLM pair 3, R CLS.Conf. = LLM pair 3. LLM pair 3, R LLM.Orig. = LLM pair 3. LLM pair 3, R LLM.Conf. = LLM pair 3. MT-Bench, R SW.Orig. = 8 . 4. MT-Bench, R SW.Conf. = 8 . 3 ± 0 . 0. MT-Bench, R MF.Orig. = 8 . 1. MT-Bench, R MF.Conf. = 8 . 3 ± 0 . 1. MT-Bench, R CLS.Orig. = 8 . 3. MT-Bench, R CLS.Conf. = 8 . 4 ± 0 . 1. MT-Bench, R LLM.Orig. = 8 . 1. MT-Bench, R LLM.Conf. = 8 . 2 ± 0 . 1. MMLU, R SW.Orig. = 51. MMLU, R SW.Conf. = 64 ± 1. MMLU, R MF.Orig. = 57. MMLU,", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is an LLM control plane ?", - "target_page": 3, - "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3 LLMControl Plane Integrity\nIn this section, we define LLM control plane integrity . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\nFormalizing control planes. An LLM control plane R ω is a potentially randomized algorithm. It is parameterized by a string ω , called the parameters. It utilizes some number n of LLMs denoted by M . We will mostly focus on the case of n = 2 , and, for reasons that will be clear in a moment, use M s ('strong') and M w ('weak') to denote the two underlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing a response via y ← $ R M ω ( x ) . Here we use ← $ to denote running R with fresh random coins; we use ← when R is deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of M s or M w should be used to respond to a query.\nInference flow. Given a set of LLMs M , a control plane R ω , and an input x , an LLM inference flow is the sequence of LLM invocations M i j ( z j ) for 1 ≤ j ≤ m and i j ∈ { w , s } made when executing R M ω ( x ) . Here m is the total number of LLM invocations, and z 1 , . . . , z m are the queries made to the underlying LLMs. Should R be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "2 LLMControl Planes and Routing\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or sequence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, with API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at different tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple LLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual LLMs plateaus [8-10].\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer queries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from networking [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to underlying LLMs, combine answers from underlying LLMs, and more.\nLLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. LLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, the router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a response. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure a score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative workloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response to return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a cascade, stopping when it obtains a response classified by the router as sufficient.\n2\nIn contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].", - "page_start": 1, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "10 Conclusion\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call 'LLM control planes' that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n17\nWe introduced and defined a new safety property, LLM control plane integrity . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating queryindependent 'confounder gadgets.' When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.", - "page_start": 16, - "page_end": 17, - "source_file": "arxiv1.pdf" - }, - { - "text": "3 LLMControl Plane Integrity\n· White-box setting : The adversary knows the control plane algorithm and its parameters ω .\n· Black-box (transfer) setting : The adversary does not know the control plane algorithm R and ω for the target model, but knows instead another control plane algorithm R ' ω ' and its parameters. We refer to R ' ω ' as the surrogate . For example, this could arise if an adversary trains their own router using available data. In this setting our attacks are also zero-shot in that they do not require any interaction with the target control plane before the query that is being rerouted.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" - }, - { - "text": "2 LLMControl Planes and Routing\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 × in the case of NotDiamond [7].", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nLLM pair 1, R MF = LLM pair 1. LLM pair 1, ˆ R SW R CLS = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R MF R CLS = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R CLS S FM = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R LLM R MF = LLM pair 1. LLM pair 1, R CLS = LLM pair 1. MT-Bench, R MF = - 0 . 1. MT-Bench, ˆ R SW R CLS = - 0 . 1. MT-Bench, R LLM = 0 . 0. MT-Bench, R SW = - 0 . 1. MT-Bench, ˆ R MF R CLS = - 0 . 1. MT-Bench, R LLM = 0 . 0. MT-Bench, R SW = - 0 . 1. MT-Bench, ˆ R CLS S FM = 0 . 0. MT-Bench, R LLM = 0 . 1. MT-Bench, R SW = - 0 . 2. MT-Bench, ˆ R LLM R MF = - 0 . 1. MT-Bench, R CLS = - 0 . 2. MMLU, R MF = - 0 . 1. MMLU, ˆ R SW R CLS = 0 . 3. MMLU, R LLM = - 0 . 2. MMLU, R SW = 4 . 8. MMLU, ˆ R MF R CLS = 1 . 0. MMLU, R LLM = 0 . 5. MMLU, R SW = 2 . 5. MMLU, ˆ R CLS S FM = - 1 . 3. MMLU, R LLM = - 0 . 8. MMLU, R SW = 2 . 6. MMLU, ˆ R LLM R MF = - 0 . 9. MMLU, R CLS = 0 . 3. GSM8K, R MF = 14 . 9.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" - }, - { - "text": "ABSTRACT\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. Routers represent one type of what we call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we investigate routers' adversarial robustness.\nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial inputs, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate queryindependent token sequences we call 'confounder gadgets' that, when added to any query, cause LLM routers to send the query to a strong LLM.\nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings against a variety of open-source and commercial routers, and that confounding queries do not affect the quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining low perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating alternative defenses.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "9 Related Work\nEvasion attacks against ML systems. A large body of work has investigated evasion attacks against ML systems [25, 43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of multi-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our results compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity attacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion.\nPrompt injection against LLMs. Prompt injection is a class of attacks against LLMs in which the adversary manipulates the prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adversarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely explored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as 'do not output expletives' [23, 42, 54, 66, 72, 73].\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for example, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection attacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into thirdparty data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its users. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate their integrity by exploiting the weaknesses of the underlying LLM [19, 55].\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the control plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks that, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming controlplane-confounding queries.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nTable 4: Average benchmark-specific scores of responses to the original and confounded queries with Mistral-7B-Instructv0.3 (LLM pair 2) or Llama-2-7B-chat-hf (LLM pair 3) as the weak model, in the white-box setting. Results further emphasize that the rerouting attack improves quality of responses when there is a significant gap between the weak and strong LLMs.\nGSM8K, R MF.Conf. = 67 ± 1. GSM8K, R CLS.Orig. = 49. GSM8K, R CLS.Conf. = 63 ± 1. GSM8K, R LLM.Orig. = 38. GSM8K, R LLM.Conf. = 63 ± 2. LLM pair 3, R SW.Orig. = LLM pair 3. LLM pair 3, R SW.Conf. = LLM pair 3. LLM pair 3, R MF.Orig. = LLM pair 3. LLM pair 3, R MF.Conf. = LLM pair 3. LLM pair 3, R CLS.Orig. = LLM pair 3. LLM pair 3, R CLS.Conf. = LLM pair 3. LLM pair 3, R LLM.Orig. = LLM pair 3. LLM pair 3, R LLM.Conf. = LLM pair 3. MT-Bench, R SW.Orig. = 8 . 4. MT-Bench, R SW.Conf. = 8 . 3 ± 0 . 0. MT-Bench, R MF.Orig. = 8 . 1. MT-Bench, R MF.Conf. = 8 . 3 ± 0 . 1. MT-Bench, R CLS.Orig. = 8 . 3. MT-Bench, R CLS.Conf. = 8 . 4 ± 0 . 1. MT-Bench, R LLM.Orig. = 8 . 1. MT-Bench, R LLM.Conf. = 8 . 2 ± 0 . 1. MMLU, R SW.Orig. = 51. MMLU, R SW.Conf. = 64 ± 1. MMLU, R MF.Orig. = 57. MMLU,", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nMF = 1 . 6. MMLU, ˆ R SW R CLS = 4 . 0. MMLU, R LLM = 4 . 2. MMLU, R SW = 7 . 9. MMLU, ˆ R MF R CLS = 5 . 0. MMLU, R LLM = 4 . 4. MMLU, R SW = 5 . 0. MMLU, ˆ R CLS S FM = - 2 . 9. MMLU, R LLM = 3 . 2. MMLU, R SW = 5 . 2. MMLU, ˆ R LLM R MF = - 0 . 9. MMLU, R CLS = 3 . 8. GSM8K, R MF = 13 . 6. GSM8K, ˆ R SW R CLS = 8 . 7. GSM8K, R LLM = 18 . 5. GSM8K, R SW = 18 . 9. GSM8K, ˆ R MF R CLS = 14 . 4. GSM8K, R LLM = 18 . 3. GSM8K, R SW = 13 . 1. GSM8K, ˆ R CLS S FM = 4 . 0. GSM8K, R LLM = 15 . 5. GSM8K, R SW = 11 . 3. GSM8K, ˆ R LLM R MF = 8 . 4. GSM8K, R CLS = 10 . 8. LLM pair 3, R MF = LLM pair 3. LLM pair 3, ˆ R SW R CLS = LLM pair 3. LLM pair 3, R LLM = LLM pair 3. LLM pair 3, R SW = LLM pair 3. LLM pair 3, ˆ R MF R CLS = LLM pair 3. LLM pair 3, R LLM = LLM pair 3. LLM pair 3, R SW = LLM pair 3. LLM pair 3, ˆ R CLS S FM = LLM pair 3. LLM pair 3, R LLM = LLM pair 3. LLM pair 3, R SW = LLM pair 3. LLM pair 3, ˆ R LLM R MF = LLM pair 3. LLM pair 3, R CLS = LLM pair 3. MT-Bench, R MF = 0 . 2. MT-Bench,", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is a confounder gadget ?", - "target_page": 5, - "target_passage": " Given a query xi, we prepend a confounder gadget ci, which is a short sequence of adversarially chosen tokens.", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "4 Confounding Control Planes with Gadgets\n(1) Select a target index j ∈ [1 , n ] uniformly.\n(2) Generate a set B of B + 1 candidates. First set ˜ c 0 = c ( t ) i , the current confounder. To generate B additional candidates, select replacement tokens from I uniformly, forming the set { t b ←I} B b =1 . Replace the j th token in the current confounder ˜ c 0 with t b :\n˜ c b = [ c ( t ) i, 1 , . . . , c ( t ) i,j -1 , t b , c ( t ) i,j +1 , . . . , c ( t ) i,n ] .\n5\nLet B = { ˜ c 0 , . . . , ˜ c B } .\n(3) Find the candidate that maximizes the score:\nc ( t +1) i ← arg max c ∈B S θ ( c ∥ x i ) . (1)\nThe final confounder c ( T ) i is used with query x i . We early abort if, after 25 iterations, there is no update to the confounder gadget. Technically, we could abort early if we find a confounder whose score exceeds τ . Running further can be useful when an adversary does not know τ .\nThe attack's runtime is dominated by T · B times the cost of executing S . In practice, S are designed to be fast (otherwise routers would significantly increase the latency of applications that use them). We report precise timings later; in summary, the attack is fast because we can set T to be relatively small and still find high-scoring confounders.\nDue to the randomness in index and token selection, the method converges to different, yet similarly effective, confounder gadgets on each run. Our evaluation will thus measure average performance over multiple gadgets.", - "page_start": 4, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "4 Confounding Control Planes with Gadgets\nIn more detail, we assume the adversary has access to a router R ' ω ' , called the surrogate , that is trained on data similar to that used for the target router. Then the attack is the same as above, except that we use the surrogate's scoring function S ' θ ' instead of the target's S θ . Again, we will see that this works surprisingly well: the query-independent confounders found for the surrogate transfer to successfully reroute queries against the target router.\nPutting it all together. In summary, our methodology for input adaptation attacks is:\n(1) (Preprocessing) Develop a single query-independent confounder gadget c , using either the target router or surrogate to score the confounder.\n(2) (Input adaptation) For each query x i , submit ˆ x i = c ∥ x i instead to obtain a response ˆ y i .\nThe confounder is applied to all queries, i.e., the adversary does not need to guess whether the original query would have been routed to the weak or strong model. In the rest of the paper, we demonstrate the confounders rarely result in 'downgrades,' i.e., rerouting of queries from the strong to weak model.\nWe have experimented with variations of this approach that don't work quite as well, for example adding c as a suffix instead of a prefix. See Appendix B for details.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "C Optimization-Free Gadget Generation\nWe evaluate optimization-free alternatives to our black-box optimization method for generating confounder gadgets.\nFixed gadget. A simple way to create a gadget without resorting to optimization is to repeat n tokens. We use ! as the initialization token, so the gadget in this case is !!!!!!!!!! . Another possibility is to select n tokens uniformly at random. Table 14 shows the upgrade rates for both options, were in the latter setting we repeat the process 10 times and report the average result and the standard error. While they are non-negligible, especially for the randomly sampled gadgets, they significantly underperform the upgrade rates reported in Table 1 for optimized gadgets.\nInstruction injection. Prompt injection is a known attack on LLMs [50, 64], thus we consider a gadget consisting of a direct instruction to the router to treat the query as a complex one and obtain a high-quality response.\nWe evaluated 4 differently phrased instructions: two created manually and two generated by, respectively, Gemini [61] and GPT-4o [2], denoted as 'ours-1', 'ours-2', 'Gemini', and 'GPT'.\nTable 15 reports the results. This method works well in a few cases but poorly in most. This highlights the difference between attacking LLMs and attacking LLM routers.", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nWenowempirically evaluate our rerouting attack against the open-source routers described in the previous section. Unless otherwise specified, our evaluation focuses on the query-independent attack setting where the attacker first finds a fixed set of gadgets and then uses them to attack arbitrarily many queries. This is the conservative setting, and query-specific gadgets - which carry a higher computational cost - generally work better.\nIn Appendix C we evaluate optimization-free alternatives for generating our confounding gadgets, and show they significantly underperform our optimization-based approach.\nWhite-box confounder gadget generation. Following our attack framework described in Section 4, we construct a query-independent control-plane gadget designed to confuse each router. We start with the white-box setting, setting the batch size to B = 32 and the number of iterations to T = 100 , ignoring thresholds. We generate four sets of n = 10 gadgets, i.e., ten for each router. Examples of generated gadgets can be found in Appendix A.\nWhen reporting scores below, we therefore report the average over the n gadgets used with all 72 MT-bench queries, 100 randomly selected MMLU queries, and 100 randomly selected GSM8K queries. None of these testing queries were used in the training of the routers or their calibration.\nRuntime and convergence. Figure 4 shows the convergence rates for 10 different gadgets, against different routing algorithms. The overall average number of iterations before convergence is 58. Generation against R SW converges the\n8\nFigure 4: Convergence of gadget generation against different routing algorithms.\nTable 1: The white-box attack's rerouting success rate. 'Upgrade' is the percentage of 'Weak' queries successfully rerouted to the strong model by adding a confounder gadget. 'Strong' shows the change in the percentage of queries that are routed to the strong LLM M s before and after our rerouting attack.", - "page_start": 7, - "page_end": 8, - "source_file": "arxiv1.pdf" - }, - { - "text": "4 Confounding Control Planes with Gadgets\nQuery-independent confounders. One downside of the per-query approach is that the adversary must repeat, for each query, the search for a good confounder. In practice, the adversary might prefer a query-independent attack. Our confounder gadget approach extends to this setting readily: perform the search routine above for an empty query. In other words, just ignore x i in the query-dependent attack above, replacing S θ ( c ∥ x i ) in Eq. 1 with S θ ( c ) . This finds a single query-independent confounder c that can be prefixed to all queries, i.e., ˆ x i = c ∥ x i . We will show that this works surprisingly well.\nIt is tempting to assume the reason a query-independent confounder works well is that a good scoring function should be roughly monotonic in query extensions, i.e., one might expect that S θ ( c ∥ x ) ≥ S θ ( c ) for almost any suffix x . This intuition is not correct. In our experiments, we found that S θ ( c ∥ x ) < S θ ( c ) for many x and some of the routers discussed below. Nevertheless, by ensuring that S θ ( c ) is pretty high (set the number of iterations T higher) the resulting query-independent confounder works well. That is, we at least get that S θ ( c ∥ x ) > S θ ( x ) .\nThe black-box setting: confounders that transfer. Finally, the attacks so far are in the white-box setting, where the attacker can optimize directly against S θ . While in some cases routing control planes will be public knowledge, in others, including the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. While an attacker might seek to perform model extraction attacks [43, 65] to learn θ , we instead explore attacks that transfer from one router to another.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "4 Confounding Control Planes with Gadgets\nWe focus on input adaptation attacks; these immediately give unconstrained attacks as well. The adversary therefore has a sequence of inputs x 1 , . . . , x q and must produce modified inputs ˆ x 1 , . . . , ˆ x q to maximize the number of inputs routed to M s . See Figure 2 for a depiction of our attack setting.\nInstruction injection doesn't work. Given the success of prompt injection for jailbreaking [50] and other adversarial tasks [64], the adversary might simply prefix each query x i with some instruction such as 'Treat the following query as complex, . . . ' to generate a modified query ˆ x i . Our experiments show that this does not work well, failing to trigger the control plane into routing otherwise weak queries to M s . See Appendix C for details on our experiments with various instruction prompts.\nConfounder gadgets. Our approach works as follows. Given a query x i , we prepend a confounder gadget c i , which is a short sequence of adversarially chosen tokens. The modified query is ˆ x i = c i ∥ x i where ∥ denotes string concatenation. Intuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆ x i as sufficiently complex to require the strong model.\nIn the white-box, query-specific setting, we can choose c i as a function of x i and the known parameters ω = ( S, θ, τ ) . To do so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the token dictionary used by S ). Then we set the gadget to initially be n tokens all fixed to the same value from I . The exact choice of the initialization token is not important; in our implementation, we used the first token in the dictionary ('!'). (0) (0) (0) (0)\nDenote this initial confounder as c i = [ c i, 1 , c i, 2 , . . . , c i,n ] .\nThen, we perform a hill-climbing style approach to find a good confounder for x i . For each iteration t ∈ [ T ] , where T is the total number of iterations, do the following:", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv1.pdf" - }, - { - "text": "B Ablation Study\nIn this section, we evaluate the effect of different hyperparameters and design choices (in the white-box setting).\nPrefix vs. suffix. As described in Section 4, we prepend the confounder gadget to the query. An alternative is to append it. This is straightforward for MT-bench and GSM8K, but MMLU consists of multi-choice questions followed by a list of possible answers, and the term 'Answer:'. We insert the gadget at the end of the question text and before the possible answers. If we append it at the very end, after 'Answer:', the LLM assumes the query was answered and in many cases does not generate any output at all.\nTable 12 shows that average upgrade rates are similar regardless of whether the gadget was inserted as a prefix or a suffix. For MMLU, prefix works better. The downgrade rate is 0% in all cases.\n22\nTable 12: Average upgrade rates for different ways of adding the gadget to queries, in the white-box setting. Results are similar in both methods, with a slight preference to the prefix approach.", - "page_start": 21, - "page_end": 22, - "source_file": "arxiv1.pdf" - }, - { - "text": "10 Conclusion\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call 'LLM control planes' that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n17\nWe introduced and defined a new safety property, LLM control plane integrity . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating queryindependent 'confounder gadgets.' When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.", - "page_start": 16, - "page_end": 17, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nTable 7: Differences between average benchmark specific scores of responses to the original and confounded queries, when the confounder gadget was generated for a different surrogate router than the target (black-box setting) for three LLM pairs. Positive values indicate a higher average score for responses to the confounded queries; higher values are better for the attacker. Results are averaged across gadgets. Standard errors were omitted for readability and are on average 0 . 1 , 0 . 8 , and 1 . 8 for MT-bench, MMLU and GSM8K, respectively. Aligned with the white-box setting, results show almost no decrease in performance, and improvement when there is a performance gap for the LLM pair.\nResults for LLM pair 4. As discussed in Section 5, we replace the strong model that was used by Ong et al. [47], GPT-41106-preview (rank 28 in the Chatbot Arena leaderboard [1, 21]), with the open-sourced Llama-3.1-8B (rank 58) to reduce the costs of our extensive set of evaluations. In this section we perform a smaller-scale evaluation of the quality-enhancing attack performance when using GPT as the strong model, i.e., LLM pair 4. We evaluate this setting using three of the n = 10 confounder gadgets for each router.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nfastest (50 iterations on average), R MF the slowest (66 iterations on average). Interestingly, the score of R SW does not increase much during optimization but is still sufficient for a successful attack.\nRuntime varies significantly when generating gadgets against different routing methods. On a machine with one A40 GPU, 4 CPUs, and 180G RAM, a single iteration takes 36 . 9 s, 8 . 4 s, 0 . 8 s, and 6 . 9 s for the R SW , R MF , R CLS , and R LLM routers, respectively. On average, it takes around 31 minutes to generate a gadget for the R SW router, 9 minutes for R MF , 50s for R CLS , and 6 minutes for R LLM .\nRerouting success rates. Recall that our attack adds the same confounder gadget to all queries. We start by evaluating the reroute success rates : What fraction of confounded queries does the target router send to the strong model M s ? We show the results for our attack in Table 1. Focusing first on the columns labeled 'Strong', the notation ' X → Y ± Z ' relays that for unmodified queries, X %are routed to the strong model M s , and that for the n = 10 confounders we achieved an average of Y % of queries sent to M s . The standard error is Z . Note that while calibration targets ϵ = 0 . 5 , we see some natural variance in X for the test sets.\nTo breakdown success further, we additionally report the upgrade rate , which focuses on the percentage of queries that were (a) originally routed to the weak model, and (b) routed to the strong model after they were modified with the confounder gadget. Because in our attacks few queries get 'downgraded' (confounders cause them to be rerouted to the weak model instead of strong), the upgrade rate dictates the success rate.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "What is called bad-cavity Ramsey laser ?", - "target_page": 1, - "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\ncus on the stimulated emission spectrum via multiple coherent interactions inside the cavity. We find this Ramsey laser can provide a stimulated-emission spectrum with a linewidth much narrower than that of any conventional optical Ramsey seperated-field spectroscopy, which is commonly applied in optical atomic clock. Our results also show that a subnatural linewidth spectroscopy, superior to any other available subnatural spectroscopy technique at present [3-10], can be reached by this kind of laser, if a suitable atomic level structure is chosen. Thus, this method can provide an e ff ective subnatural spectroscopy, and the possibilities for the new optical clock scheme [15] and atom interferometers [2].\nTheoretical framework: We consider the case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. All atoms are pumped onto the upper lasing state a before entering the first cavity of seperated field, and the lower lasing state is b . We assume all the atoms have the same velocities υ , that means what we consider here is a homogeneous laser system. And for the sake of simplicity, we consider the two-standing waves linear optical Ramsey configuration with a grid as spatial selector [20, 21]. Our treatment can be extended to other configurations as in [22-24]. The length of each oscillating part is l , and the length of the free drift region is L . The corresponding Hamiltonian is\nH = /planckover2pi1 ω ˆ a † ˆ a + /planckover2pi1 ∑ j [ ω j a ( t ) σ j a + ω j b ( t ) σ j b ] + /planckover2pi1 g ∑ j Γ j ( t )(ˆ a † ˆ σ j -e -i /vector k · /vector rj + ˆ σ j + ˆ ae i /vector k · /vector rj ) , (1)", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nYang Li, Wei Zhuang, Jinbiao Chen, ∗ and Hong Guo † CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China (Dated: October 29, 2018)\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\nIntroduction: Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nConclusion: In summary, we propose a new subnatural linewidth spectroscopy technique, which is a laser by using Ramsey seperated-field cavity to realize the output of stimulated-emission radiation via multiple coherent interaction with atomic beam. We find the linewidth of Ramsey laser is subnatural if we choose an appropriate atomic level, and the bad-cavity laser mechanism will dramatically reduce cavityrelated noise as discussed in active optical clock [15-19]. Our results show that this new subnatural linewidth spectroscopy is superior to conventional optical Ramsey seperated-field spectroscopy and any other available subnatural spectroscopy technique at present [3-10]. Considering one have to apply the separated-field method in any phase detection as in Ramsey-Bord e 'interferometer [2], to investigate the e ff ects of phase di ff erences between the two oscillating fields [31] in this stimulated separated-field method with such subnatural linewidth will be our next research aim.\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful discussions. This work is supported by MOST of China (grant 2005CB724500, National Natural Science Foundation of China (grant 60837004, 10874009), National Hi-Tech Research and Development (863) Program.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nThough, the natural linewidth of quantum transition was regarded as the ultimate limit to high-resolution laser spectroscopy [4], several methods of subnatural linewidth spectroscopy have been proposed to gain subnatural linewidth [310]. However, in all these e ff orts, including optical Ramsey spectroscopy, subnatural line is realized at the expense of a quick reduction in signal-to-noise (SNR) ratio due to the exponential decaying of signal, thus all these schemes can only get the linewidth several times narrower than the atomic natural linewidth. In the past three decades, this situation does not change in the field of the precision laser spectroscopy. On the other hand, the thermal noise of the cavity mirrors is the main obstacle for further linewidth reduction of a laser [11, 12], and it is a challenge to substantially reduce this noise further[13]. Recently, a new scheme, called active optical clock [14-18], was proposed to substantially reduce the laser linewidth. With lattice trapped atoms, it is possible to reach mHz linewidth laser based on the mechanism of active optical clock [14, 15, 19]. The principal mechanism of active optical clock is to directly extract light emitted from the ultranarrow atomic transition with a cavity mode linewidth much wider than that of lasing. This bad cavity ensures that any frequency shift due to cavity noise reduces to cavity-pulling e ff ect [1517], then the thermal noise is not the major obstacle again for reducing the linewidth. This means the bad cavity can play an indispensable role in new subnatural linewidth spectroscopy.\nIn this Letter, we propose a new scheme called Ramsey laser with bad cavity. Distinct from any previous applications of conventional Ramsey separated oscillating fields method [1], which focuses on the absorption spectrum, we here fo-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nOur method of Ramsey laser is suitable for any atoms with metastable energy level, as an example, we choose the transition from the metastable state 4 s 4 p 3 P 1 to the ground state 4 s 2 1 S 0 of 40 Ca to check the striking feature of this laser: subnatural linewidth. As mentioned in [29], the corresponding natural linewidth of the metastable state 4 s 4 p 3 P 1 is 320Hz. As in the recently proposed active optical clock with atomic beam [15], the velocity of the atoms in thermal atomic beam is about 500m / s, and the length of the interaction region is about 1mm, then the time for the atom to traverse each coherentinteraction region is on the order of magnitude of 1 µ s. If a bad cavity with κ is on the order of 10 7 Hz, the relation κ/ 2 /greatermuch τ -1 is satisfied. Then when g is on the order of the magnitude of kHz, which can be easily achieved for current technique [30], from the linewidth expression of Eq.(16) the order of magnitude of linewidth is below 1 Hz. This means the linewidth of a Ramsey laser can be more than two orders of magnitude narrower than the atomic natural linewidth, therefore our Ramsey method provides a new subnatural spectroscopy technique. And since it is stimulated-emission spectrum, it overcomes the di ffi culty in other subnatural linewidth spectroscopy schemes where the quick reduction of signal to noise ratio is a formidable limit. We should point out that this Ramsey laser does not escape the limitation of all active optical clock: in order to pump atoms to the excited state effectively and to be stimulated emit photon during the lifetime of a metastable state, this new method will only be applicable to some special transitions [17].", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett. 38 , 159 (1977).\n[25] L. Davidovich, Rev. Mod. Phys. 68 , 127 (1996).\n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, Phys. Rev. A 47 , 1431 (1993).\n[27] M. Sargent III, M. O. Scully, and W. E. Lamb, Laser Physics (Addition Wesley, Reading, MA, 1974).\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci, Dynamic Instabilities and Pulsations in Lasers , Progress in Optics XXV, edited by E. Wolf (Elsevier, Amsterdam, 1988).\n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, J. Phys. B 13 , 2231 (1980).\n[30] K. An and M. S. Feld, Phys. Rev. A 56 , 1662(1997).\n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev. 84 , 506(1951).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nFrom the expression above, we find that the pumping statistic can influence the linewidth. For regular injection ( p = 1), the linewidth is the narrowest, while for Poissonian injection ( p = 0), the linewidth is the broadest. But even for regular injection, the linewidth is larger than the case of one cavity. That means the mechanism of separated-field does not play the role in reducing the linewidth as in the conventional optical Ramsey method, which is counter-intuitive. However, the separated fields are indispensable for any phase detection like atom interferometry. The details about the method of active atom interferometry will appear elsewhere.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\n∗ E-mail: jbchen@pku.edu.cn\n† E-mail: hongguo@pku.edu.cn.\n[1] N. F. Ramsey, Phys. Rev. 76 , 996 (1949).\n[2] B. Dubetsky and P. R. Berman, In Atom Interferometry , edited by P. R. Berman (Academic Press, Cambridge, MA, 1997).\n[3] M. M. Salour, Rev. Mod. Phys. 50 , 667 (1978).\n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett. 44 , 1254 (1980).\n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. 13 4345 (1980).\n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A 24 , 1914 (1981).\n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A 28 , 2248 (1983).\n[8] W. Gawlik, J. Kowalski, F. Trager, and M. Vollmer, Phys.Rev.\n4", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "James Parker\nPresident, Parker Properties, Inc.\nJack D. Ramsey, M.D. Physician", - "page_start": 94, - "page_end": 94, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 9: Average performance of models per task category.\n0.71. udever-bloom-560m, Reranking = 0.43. udever-bloom-560m, Retrie v al = 0.28. udever-bloom-560m, STS = 0.62. udever-bloom-560m, Summarization = 0.29 0.24. laser2, A v erage = 0.52. laser2, BitextMining = 0.95. laser2, Classification = 0.58. laser2, Clustering = 0.30. laser2, P airClassification = 0.82. laser2, Reranking = 0.39. laser2, Retrie v al = 0.11 0.13. laser2, STS = 0.51 0.67. laser2, Summarization = 0.31. bge-m3-custom-fr, A v erage = 0.66. bge-m3-custom-fr, BitextMining = 0.94. bge-m3-custom-fr, Classification = 0.67. bge-m3-custom-fr, Clustering = 0.40. bge-m3-custom-fr, P airClassification = 0.77. bge-m3-custom-fr, Reranking = 0.44 0.79. bge-m3-custom-fr, Retrie v al = 0.59. bge-m3-custom-fr, STS = 0.80. bge-m3-custom-fr, Summarization = 0.30. sentence _croissant _alpha _v0.2, A v erage = 0.66. sentence _croissant _alpha _v0.2, BitextMining = 0.92. sentence _croissant _alpha _v0.2, Classification = 0.66. sentence _croissant _alpha _v0.2, Clustering = 0.44. sentence _croissant _alpha _v0.2, P airClassification = 0.80. sentence _croissant _alpha _v0.2, Reranking = 0.77. sentence _croissant _alpha _v0.2, Retrie v al = 0.61. sentence _croissant _alpha _v0.2,", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv4.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "How the steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained ?", - "target_page": 2, - "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\ncus on the stimulated emission spectrum via multiple coherent interactions inside the cavity. We find this Ramsey laser can provide a stimulated-emission spectrum with a linewidth much narrower than that of any conventional optical Ramsey seperated-field spectroscopy, which is commonly applied in optical atomic clock. Our results also show that a subnatural linewidth spectroscopy, superior to any other available subnatural spectroscopy technique at present [3-10], can be reached by this kind of laser, if a suitable atomic level structure is chosen. Thus, this method can provide an e ff ective subnatural spectroscopy, and the possibilities for the new optical clock scheme [15] and atom interferometers [2].\nTheoretical framework: We consider the case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. All atoms are pumped onto the upper lasing state a before entering the first cavity of seperated field, and the lower lasing state is b . We assume all the atoms have the same velocities υ , that means what we consider here is a homogeneous laser system. And for the sake of simplicity, we consider the two-standing waves linear optical Ramsey configuration with a grid as spatial selector [20, 21]. Our treatment can be extended to other configurations as in [22-24]. The length of each oscillating part is l , and the length of the free drift region is L . The corresponding Hamiltonian is\nH = /planckover2pi1 ω ˆ a † ˆ a + /planckover2pi1 ∑ j [ ω j a ( t ) σ j a + ω j b ( t ) σ j b ] + /planckover2pi1 g ∑ j Γ j ( t )(ˆ a † ˆ σ j -e -i /vector k · /vector rj + ˆ σ j + ˆ ae i /vector k · /vector rj ) , (1)", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\n〈 ˜ Fk ( t ) ˜ Fk ( t ' ) 〉 = ˜ D (0) kl δ ( t -t ' ) + ˜ D (1) kl δ ( t -t ' -τ ) + ˜ D (2) kl δ ( t -t ' + τ ) + ˜ D (3) kl δ ( t -t ' -τ -T ) + ˜ D (4) kl δ ( t -t ' + τ + T ) + ˜ D (5) kl δ ( t -t ' -2 τ -T ) + ˜ D (6) kl δ ( t -t ' + 2 τ + T ) + ˜ D (7) kl δ ( t -t ' -T ) + ˜ D (8) kl δ ( t -t ' + T ) , (8)\nwhere ˜ D ( i ) kl are the c-number Langevin di ff usion coe ffi cients, related to quantum Langevin di ff usion coe ffi cients D ( i ) kl as in [27].\nSteady-state solutions: The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the cnumber Langevin equations and setting the time derivatives equal to zero. The analytical solutions are very complex, and one could numerically solve the steady-state equations. In this paper, we only care about the bad cavity limit γ max /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2. Since the atomic transit time is much shorter than the damping times of atomic variables, one could ignore the e ff ect of the spontaneous emission of the atom. By the standard way [25], We get the following steady-state values:\n∣ ∣ ∣ ˜ Ass ∣ ∣ ∣ 2 = R (1 -A 0 + A 1 -A 2) κ = R ( B 0 -B 1 + B 2) κ ,\n˜ Nass = R τ 2 [ 1 + C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] ,\n˜ Nbss = R τ 2 [ 1 -C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] .", - "page_start": 1, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nYang Li, Wei Zhuang, Jinbiao Chen, ∗ and Hong Guo † CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China (Dated: October 29, 2018)\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\nIntroduction: Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nA detailed analysis about the stability of the steady-state can be found such as in [28]. In this paper, we assume the steadystate solution is stable.\nLaser linwidth: Suppose the quantum fluctuation is small, the evolution of the fluctuations can be obtained by making a linearization of the c-number Langevin equations around the steady-state solution. Then the measured spectra of field fluctuations will be directly related to these quantities. By Fourier transformations of the linearized equation, we get the amplitude and phase quadrature components δ X ( ω ) and δ Y ( ω ) [26]. Well above threshold, one can neglect the amplitude fluctuations, and the linewidth inside the cavity is related to the phase-di ff usion coe ffi cient [25]. For small fluctuation of laser phase, the spectrum of phase fluctuations is simply related to the spectrum of the phase quadrature component of the field fluctuations, namely,\n( δϕ 2 ) ω = 1 I 0 ( δ Y 2 ) ω.\nIn the region γ ab /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2, as in the recently proposed active optical clock [15] with atomic beam. The phase quadrature component of the field fluctuations can be expressed as\n( δϕ 2 ) ω ≈ ( κ/ 2 + γ ab ) 2 I 0 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 ] g 2 4( κ/ 2 + γ ab ) 2 { 4 γ ab ˜ Nass + 2 R [( A 0 + B 0) + ( A 2 + B 2)] + Rp [( C 0 -C ∗ 0 ) 2 + ( C 1 -C ∗ 1 ) 2 + ( C 2 -C ∗ 2 ) 2 ] } . (9)\nSince the time τ and T is much shorter than the time scale of the atomic dampings, we can neglect the dampings when calculate Ai , Bi , Ci . By using\nA 0 = cos 2 ( Ω R 2 τ ) , A 1 = cos 2 ( Ω R 2 τ ) ,\nA 2 = 1 -sin 2 ( Ω R τ ) cos 2 ( ∆ 2 2 T ) , B 0 = sin 2 ( Ω R 2 τ ) ,", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nOur method of Ramsey laser is suitable for any atoms with metastable energy level, as an example, we choose the transition from the metastable state 4 s 4 p 3 P 1 to the ground state 4 s 2 1 S 0 of 40 Ca to check the striking feature of this laser: subnatural linewidth. As mentioned in [29], the corresponding natural linewidth of the metastable state 4 s 4 p 3 P 1 is 320Hz. As in the recently proposed active optical clock with atomic beam [15], the velocity of the atoms in thermal atomic beam is about 500m / s, and the length of the interaction region is about 1mm, then the time for the atom to traverse each coherentinteraction region is on the order of magnitude of 1 µ s. If a bad cavity with κ is on the order of 10 7 Hz, the relation κ/ 2 /greatermuch τ -1 is satisfied. Then when g is on the order of the magnitude of kHz, which can be easily achieved for current technique [30], from the linewidth expression of Eq.(16) the order of magnitude of linewidth is below 1 Hz. This means the linewidth of a Ramsey laser can be more than two orders of magnitude narrower than the atomic natural linewidth, therefore our Ramsey method provides a new subnatural spectroscopy technique. And since it is stimulated-emission spectrum, it overcomes the di ffi culty in other subnatural linewidth spectroscopy schemes where the quick reduction of signal to noise ratio is a formidable limit. We should point out that this Ramsey laser does not escape the limitation of all active optical clock: in order to pump atoms to the excited state effectively and to be stimulated emit photon during the lifetime of a metastable state, this new method will only be applicable to some special transitions [17].", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "Read from the source Volume\nWhen a user performs a read operation on the source volume, there is no redirection. The operation is similar to what is done with a volume that is not part of a FlashCopy mapping.", - "page_start": 465, - "page_end": 465, - "source_file": "sg247938.pdf" - }, - { - "text": "Dependent write operation\nA write operation that must be applied in the correct order to maintain cross-volume consistency.", - "page_start": 795, - "page_end": 795, - "source_file": "sg247938.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe first stage consists in calculating the McMillanMayer effective ion-ion interaction potentials V eff ij ( r ), by inverting the radial distribution functions (RDF) g ij ( r ) obtained by MD. The simulations were carried out on a box of 2000 water molecules and 48 NaCl pairs using the same interaction potentials as in reference [16]. This setup corresponds to a concentration of 0 . 64 moll -1 . NPT ensemble sampling at standard pressure and temperature was enforced, with a time step of 1 fs and a pressure bath coupling constant of 1 ps. An equilibration run of 0.25 ns was followed by a production run of 0.6 ns for five different initial configurations. The averages of the resulting RDF were then used for the potential inversion via the HNC closure [15]. These effective potentials are assumed to be concentration independent and will be used for simulations at all concentrations.\nSubtracting the long-range Coulombic potential V LR ij ( r ) (which depends on the dielectric constant of the solvent) from V eff ij ( r ), we obtain the short-range contribution V SR ij ( r ) to the effective potentials. These are given in Fig. 1 (species 1 and 2 refer to Na + and Cl -free ions, respectively). All the short-range potentials exhibit oscillations corresponding to the solvent layering between the ions, but this effect is particularly important for the cation-anion interaction: a considerable potential barrier ( /greaterorsimilar 2 k B T ) separates the first two attractive wells. To serve as a reference, Monte Carlo (MC) simulations were performed with these effective potentials; a comparison between MD and MC RDF is also provided in Fig. 1. The excellent agreement between both sets of RDF validates the HNC inversion procedure [17], and allows us to com-\nFIG. 1: Effective McMillan-Mayer short-range pair potentials extracted from explicit solvent simulations using the HNC closure. (a) Cation anion, (b) cation cation, (c) anion anion, (d) cation anion RDF obtained from explicit solvent MD and implicit solvent MC simulations.\npute all ion thermodynamic properties through implicit solvent MC simulations.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "Field Information tab\nThe Field Information tab (Figure 3-5) is used to define the attributes of the database fields that make up the Content Manager OnDemand report index data. These attributes determine the characteristics of the index data and control many aspects of loading and processing data in the system. A database field must be added for each index value that is required by applications to be part of the application group.\nFigure 3-5 Application group's Field Information tab\nNote: You can update the application group to add a database field.\nWhen you define a field, you specify the field name, field type, data type, whether it is a segment field, the expiration date, and more. In the following sections, we take a closer look at field type and whether it is a segment or an application ID field.", - "page_start": 73, - "page_end": 73, - "source_file": "sg246915.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nConclusion: In summary, we propose a new subnatural linewidth spectroscopy technique, which is a laser by using Ramsey seperated-field cavity to realize the output of stimulated-emission radiation via multiple coherent interaction with atomic beam. We find the linewidth of Ramsey laser is subnatural if we choose an appropriate atomic level, and the bad-cavity laser mechanism will dramatically reduce cavityrelated noise as discussed in active optical clock [15-19]. Our results show that this new subnatural linewidth spectroscopy is superior to conventional optical Ramsey seperated-field spectroscopy and any other available subnatural spectroscopy technique at present [3-10]. Considering one have to apply the separated-field method in any phase detection as in Ramsey-Bord e 'interferometer [2], to investigate the e ff ects of phase di ff erences between the two oscillating fields [31] in this stimulated separated-field method with such subnatural linewidth will be our next research aim.\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful discussions. This work is supported by MOST of China (grant 2005CB724500, National Natural Science Foundation of China (grant 60837004, 10874009), National Hi-Tech Research and Development (863) Program.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "What are the consequences on the linewidth for regular and Poissonian injections ?", - "target_page": 3, - "target_passage": " For regular injection (p = 1), the linewidth is the narrowest, while for Poissonian injection (p = 0), the linewidth is the broadest.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nFrom the expression above, we find that the pumping statistic can influence the linewidth. For regular injection ( p = 1), the linewidth is the narrowest, while for Poissonian injection ( p = 0), the linewidth is the broadest. But even for regular injection, the linewidth is larger than the case of one cavity. That means the mechanism of separated-field does not play the role in reducing the linewidth as in the conventional optical Ramsey method, which is counter-intuitive. However, the separated fields are indispensable for any phase detection like atom interferometry. The details about the method of active atom interferometry will appear elsewhere.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nThough, the natural linewidth of quantum transition was regarded as the ultimate limit to high-resolution laser spectroscopy [4], several methods of subnatural linewidth spectroscopy have been proposed to gain subnatural linewidth [310]. However, in all these e ff orts, including optical Ramsey spectroscopy, subnatural line is realized at the expense of a quick reduction in signal-to-noise (SNR) ratio due to the exponential decaying of signal, thus all these schemes can only get the linewidth several times narrower than the atomic natural linewidth. In the past three decades, this situation does not change in the field of the precision laser spectroscopy. On the other hand, the thermal noise of the cavity mirrors is the main obstacle for further linewidth reduction of a laser [11, 12], and it is a challenge to substantially reduce this noise further[13]. Recently, a new scheme, called active optical clock [14-18], was proposed to substantially reduce the laser linewidth. With lattice trapped atoms, it is possible to reach mHz linewidth laser based on the mechanism of active optical clock [14, 15, 19]. The principal mechanism of active optical clock is to directly extract light emitted from the ultranarrow atomic transition with a cavity mode linewidth much wider than that of lasing. This bad cavity ensures that any frequency shift due to cavity noise reduces to cavity-pulling e ff ect [1517], then the thermal noise is not the major obstacle again for reducing the linewidth. This means the bad cavity can play an indispensable role in new subnatural linewidth spectroscopy.\nIn this Letter, we propose a new scheme called Ramsey laser with bad cavity. Distinct from any previous applications of conventional Ramsey separated oscillating fields method [1], which focuses on the absorption spectrum, we here fo-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nOur method of Ramsey laser is suitable for any atoms with metastable energy level, as an example, we choose the transition from the metastable state 4 s 4 p 3 P 1 to the ground state 4 s 2 1 S 0 of 40 Ca to check the striking feature of this laser: subnatural linewidth. As mentioned in [29], the corresponding natural linewidth of the metastable state 4 s 4 p 3 P 1 is 320Hz. As in the recently proposed active optical clock with atomic beam [15], the velocity of the atoms in thermal atomic beam is about 500m / s, and the length of the interaction region is about 1mm, then the time for the atom to traverse each coherentinteraction region is on the order of magnitude of 1 µ s. If a bad cavity with κ is on the order of 10 7 Hz, the relation κ/ 2 /greatermuch τ -1 is satisfied. Then when g is on the order of the magnitude of kHz, which can be easily achieved for current technique [30], from the linewidth expression of Eq.(16) the order of magnitude of linewidth is below 1 Hz. This means the linewidth of a Ramsey laser can be more than two orders of magnitude narrower than the atomic natural linewidth, therefore our Ramsey method provides a new subnatural spectroscopy technique. And since it is stimulated-emission spectrum, it overcomes the di ffi culty in other subnatural linewidth spectroscopy schemes where the quick reduction of signal to noise ratio is a formidable limit. We should point out that this Ramsey laser does not escape the limitation of all active optical clock: in order to pump atoms to the excited state effectively and to be stimulated emit photon during the lifetime of a metastable state, this new method will only be applicable to some special transitions [17].", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nConclusion: In summary, we propose a new subnatural linewidth spectroscopy technique, which is a laser by using Ramsey seperated-field cavity to realize the output of stimulated-emission radiation via multiple coherent interaction with atomic beam. We find the linewidth of Ramsey laser is subnatural if we choose an appropriate atomic level, and the bad-cavity laser mechanism will dramatically reduce cavityrelated noise as discussed in active optical clock [15-19]. Our results show that this new subnatural linewidth spectroscopy is superior to conventional optical Ramsey seperated-field spectroscopy and any other available subnatural spectroscopy technique at present [3-10]. Considering one have to apply the separated-field method in any phase detection as in Ramsey-Bord e 'interferometer [2], to investigate the e ff ects of phase di ff erences between the two oscillating fields [31] in this stimulated separated-field method with such subnatural linewidth will be our next research aim.\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful discussions. This work is supported by MOST of China (grant 2005CB724500, National Natural Science Foundation of China (grant 60837004, 10874009), National Hi-Tech Research and Development (863) Program.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nYang Li, Wei Zhuang, Jinbiao Chen, ∗ and Hong Guo † CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China (Dated: October 29, 2018)\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\nIntroduction: Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\ncus on the stimulated emission spectrum via multiple coherent interactions inside the cavity. We find this Ramsey laser can provide a stimulated-emission spectrum with a linewidth much narrower than that of any conventional optical Ramsey seperated-field spectroscopy, which is commonly applied in optical atomic clock. Our results also show that a subnatural linewidth spectroscopy, superior to any other available subnatural spectroscopy technique at present [3-10], can be reached by this kind of laser, if a suitable atomic level structure is chosen. Thus, this method can provide an e ff ective subnatural spectroscopy, and the possibilities for the new optical clock scheme [15] and atom interferometers [2].\nTheoretical framework: We consider the case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. All atoms are pumped onto the upper lasing state a before entering the first cavity of seperated field, and the lower lasing state is b . We assume all the atoms have the same velocities υ , that means what we consider here is a homogeneous laser system. And for the sake of simplicity, we consider the two-standing waves linear optical Ramsey configuration with a grid as spatial selector [20, 21]. Our treatment can be extended to other configurations as in [22-24]. The length of each oscillating part is l , and the length of the free drift region is L . The corresponding Hamiltonian is\nH = /planckover2pi1 ω ˆ a † ˆ a + /planckover2pi1 ∑ j [ ω j a ( t ) σ j a + ω j b ( t ) σ j b ] + /planckover2pi1 g ∑ j Γ j ( t )(ˆ a † ˆ σ j -e -i /vector k · /vector rj + ˆ σ j + ˆ ae i /vector k · /vector rj ) , (1)", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nTo assess the gross loss of neurons from DRG following nerve injury, we generated the Avil FlpO ;Atf3 CreERT2 ;RC::FLTG mouse line in which na¨ıve and axotomized sensory neurons were differentially labelled. In this mouse line, all neurons express tdTomato (Flp-dependent) in the na¨ıve state and switch to expressing green fluorescent protein (GFP) upon axonal damage and concurrent tamoxifen treatment (Flp- and Cre-dependent) ( Figs. 1A and B ). Following pilot experiments to optimize tamoxifen dosing regimen, this approach was both highly efficient and specific (with the caveat that it was necessary to wait for several days after nerve injury for Cre-induced GFP expression): 14 days after SNItrans surgery, GFP was expressed by 99.1 6 0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we observed GFP in only 4.6 6 0.7% of contralateral DRG neurons (Figs. S2A-D, http://links.lww.com/PAIN/C84). We then used a stereological approach to quantify the total number of neurons in L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as well as contralateral to injury. One week after SNItrans, we\nwww.painjournalonline.com\n2867", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.3. FastBlue tracer injections\nMice were briefly anesthetized during the procedure, induced with 3%to5%isoflurane, and then maintained at 1.5% to 2% as required. Hindlimbs were taped with the plantar surface of the paw facing up, and a custom, 26G removable needle with a 30˚ bevel, attached to a 25m L Hamilton syringe, was inserted between the 2 distal-most footpads, towards the medial aspect of the hindpaw. The needle wasthen rotated 90˚, so the bevel faced medially. Furthermore, 4m L FastBlue (FB; 2% in sterile phosphate-buffered saline (PBS); CAS# 73819-41-7; Polysciences, Inc, Warrington, PA) per paw was then slowly injected, and the needle was left in place for 10 seconds, before rotating and carefully retracting to avoid backflow of FB along the needle track. This prevented the FB bolus from contacting the sural innervation territory of the lateral hindpaw, restricting it largely to the tibial innervation territory of the glabrous hindpaw skin.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed2.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\nA detailed analysis about the stability of the steady-state can be found such as in [28]. In this paper, we assume the steadystate solution is stable.\nLaser linwidth: Suppose the quantum fluctuation is small, the evolution of the fluctuations can be obtained by making a linearization of the c-number Langevin equations around the steady-state solution. Then the measured spectra of field fluctuations will be directly related to these quantities. By Fourier transformations of the linearized equation, we get the amplitude and phase quadrature components δ X ( ω ) and δ Y ( ω ) [26]. Well above threshold, one can neglect the amplitude fluctuations, and the linewidth inside the cavity is related to the phase-di ff usion coe ffi cient [25]. For small fluctuation of laser phase, the spectrum of phase fluctuations is simply related to the spectrum of the phase quadrature component of the field fluctuations, namely,\n( δϕ 2 ) ω = 1 I 0 ( δ Y 2 ) ω.\nIn the region γ ab /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2, as in the recently proposed active optical clock [15] with atomic beam. The phase quadrature component of the field fluctuations can be expressed as\n( δϕ 2 ) ω ≈ ( κ/ 2 + γ ab ) 2 I 0 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 ] g 2 4( κ/ 2 + γ ab ) 2 { 4 γ ab ˜ Nass + 2 R [( A 0 + B 0) + ( A 2 + B 2)] + Rp [( C 0 -C ∗ 0 ) 2 + ( C 1 -C ∗ 1 ) 2 + ( C 2 -C ∗ 2 ) 2 ] } . (9)\nSince the time τ and T is much shorter than the time scale of the atomic dampings, we can neglect the dampings when calculate Ai , Bi , Ci . By using\nA 0 = cos 2 ( Ω R 2 τ ) , A 1 = cos 2 ( Ω R 2 τ ) ,\nA 2 = 1 -sin 2 ( Ω R τ ) cos 2 ( ∆ 2 2 T ) , B 0 = sin 2 ( Ω R 2 τ ) ,", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\nThe model Hamiltonian we use in our simulations is the minimal one able to describe helimagnetic structures:\nH = -  J 0 ∑ 〈 ij 〉 /vector S i · /vector S j + J 1 ∑ 〈 ik 〉 /vector S i · /vector S k + J 2 ∑ 〈 il 〉 /vector S i · /vector S l   . (1)\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "Give me the advantages of Ferromagnetic semiconductors", - "target_page": 1, - "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFerromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material. The realization of spin-valve devices from FM semiconductors requires the controlled switching of magnetization in adjacent layers between antiferromagnetic (AFM) and FM configurations. This has motivated several theoretical investigations of interlayer coupling in all-semiconductor devices 1 , and AFM coupling has recently been demonstrated in (Ga,Mn)As multilayers separated by p -type non-magnetic spacers 2 . However, the Curie temperature T C of (Ga,Mn)As is currently limited to 185 K in single layers 3 , and is typically much lower for layers embedded within a heterostructure 2 , which is an obstacle to the practical implementation of semiconductor spintronics.\nThe development of FM metal/FM semiconductor heterostructures has the potential to bring together the benefits of metal and semiconductor based spintronics, offering access to new functionalities and physical phenomena. Recent studies of MnAs/(Ga,Mn)As and NiFe/(Ga,Mn)As bilayer films have shown FM interlayer coupling and independent magnetization behavior, respectively 4,5 . Of particular interest is the Fe/(Ga,Mn)As system, since the growth of epitaxial Fe/GaAs(001) films is well-established 6 . Remarkably, a recent x-ray magnetic circular dichroism (XMCD) study has shown that Fe may induce a proximity polarization in the near-surface region of (Ga,Mn)As, antiparallel to the Fe moment and persisting even above room temperature 7 . Devices incorporating Fe/(Ga,Mn)As therefore offer the prospect of obtaining non-volatile room temperature spin-polarization in a semiconductor.\nUntil now, no information has been revealed about the coupling of Fe to (Ga,Mn)As layers away from the nearsurface region. At the surface, the (Ga,Mn)As layer may be highly non-stoichiometric and Mn-rich, due to its nonequilibrium nature 8,9 . Previously, Fe/(Ga,Mn)As layers were produced by a process including exposure to air followed by sputtering and annealing prior to Fe deposition,", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nwhich may further disrupt the interface order. The origin of the interface magnetism then had to be inferred by comparison to a series of reference samples 7 . Demonstration of coupling between the bulk of the layers, i.e. , an exchange bias effect, would provide direct evidence of the interface magnetic order. Moreover, such coupling would offer new means of manipulating the FM semiconductor spin state and utilizing the proximity polarization effect in a spintronic device.\nHere, we demonstrate an antiferromagnetic coupling and exchange bias in Fe/(Ga,Mn)As bilayer films, by combining element-specific XMCD measurements and bulk-sensitive superconducting quantum interference device (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in contrast to AFM coupled FM metal/FM metal exchange bias structures 10,11 ) the layers are in direct contact without a non-magnetic spacer in between. We distinguish interface and bulk (Ga,Mn)As layers that are respectively strongly and weakly antiferromagnetically coupled to the Fe overlayer. In agreement with Ref. 7 , the interface layer remains polarized at room temperature.\nThe Fe and (Ga,Mn)As layers of the present study were both grown by molecular beam epitaxy in the same ultra-high vacuum system, in order to ensure a clean interface between them. The (Ga,Mn)As layer of thickness 10 to 50 nm was deposited on a GaAs(001) substrate at a temperature of 260 · C, using previously established methods 3,8 . A low Mn concentration of x ≈ 0 . 03 was chosen in order to avoid the formation of compensating Mn interstitials. The substrate temperature was then reduced to ∼ 0 · C, before depositing a 2 nm Fe layer, plus a 2 nm Al capping layer. In-situ reflection high energy electron diffraction and ex-situ x-ray reflectivity and diffraction measurements confirmed that the layers are single-crystalline with sub-nm interface roughness. SQUID magnetometry measurements were performed using a Quantum Design Magnetic Property Measurement System. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nIn summary, we have demonstrated antiferromagnetic coupling between Fe and (Ga,Mn)As layers in bilayer structures. A markedly different coupling is observed for the bulk of the (Ga,Mn)As layer and for Mn moments in the near-interface region. A thickness-dependent exchange bias field is observed to affect the whole of the bulk (Ga,Mn)As layer, which aligns antiparallel to the Fe layer at low fields, and switches to parallel when the external field is large enough to overcome the bias field and the magnetocrystalline anisotropy fields. In contrast, the interfacial Mn moments remain aligned antiparallel to the Fe layer even at 20 kOe, the largest field studied, and are polarized at temperatures well above the T C of the bulk (Ga,Mn)As layer. The latter observation confirms the recently reported result of Ref. 7, in which the Fe/(Ga,Mn)As bilayers were produced by a different method but showed qualitatively similar behavior of the interfacial moments. Our results shed new light on the magnetic coupling in Fe/(Ga,Mn)As hybrid layers which are of potential interest for room temperature spintronics, and also offer a means of controlling the spin orientation in a FM semiconductor.\nWe acknowledge support from EU grants SemiSpinNet-215368 and NAMASTE-214499, and STFC studentship grant CMPC07100. The Advanced Light Source is supported by the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. We thank Leigh Shelford for help during the Diamond beamtime.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nSimilar behavior is observed for bilayer samples containing a 10 nm or 50 nm (Ga,Mn)As layer, with a bias field which is approximately inversely proportional to the thickness d of the ferromagnetic semiconductor layer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers 4 , and is generally observed in exchanged-biased thin films 12 . From this dependence it is possible to describe the exchange bias in terms of an interface energy per unit area, ∆ E = M FS H E d = 0 . 003 erg/cm 2 . This value is rather small compared to typical exchange bias systems 12 , reflecting the low moment density M FS of the diluted FM semiconductor layer. However, the bias field for a given (Ga,Mn)As thickness is larger than is observed for MnO/(Ga,Mn)As structures 13 , while the reproducibility and flexibility of the present structures is much higher due to the single-crystalline ferromagnetic nature of the Fe layer.\nTo confirm the presence of AFM interlayer coupling, we performed XMCD measurements at the Mn and Fe\n2\nL 2 , 3 absorption edges in order to determine the magnetic response of the individual elements. In L 2 , 3 XMCD, electrons are excited from a 2 p core level to the unoccupied 3 d valence states of the element of interest by circularly polarized x-rays at the resonance energies of the transitions. The difference in absorption for opposite polarizations gives a direct and element-specific measurement of the projection of the 3 d magnetic moment along the xray polarization vector. The absorption cross-section is conventionally obtained by measuring the decay products - either fluorescent x-rays or electrons - of the photoexcited core hole. The type of decay product measured determines the probing depth of the technique. For Mn L 2 , 3 absorption, the probing depths for FY and TEY detection are λ FY ≈ 100 nm and λ TEY ≈ 3 nm. In the current experiment, the Mn XMCD measured using FY and TEY are thus sensitive to the bulk of the (Ga,Mn)As film and the near-interface layers, respectively.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFigure 2(a)-(c) shows the magnetic field dependence of XMCD asymmetry, defined as ( I l -I r ) / ( I l + I r ) where I l ( r ) is the absorption for left- (right-) circularly polarized x-rays. This is measured at the Fe and Mn L 3 absorption peaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. The external field is applied along the photon incidence direction, which is at 70 · to the surface normal with an in-plane projection along the [110] axis. The XMCD data show that the Fe film displays a square hysteresis loop with a single magnetization switch, as expected for a monocrystalline Fe film with strong uniaxial magnetic anisotropy. The Mn XMCD shows a more complicated loop due to the effect of the interlayer coupling. The projected Mn moment aligns antiparallel to the Fe moment at remanence, and undergoes a magnetization reversal of opposite sign to the Fe. With further increase of the external magnetic field, the Mn moment gradually rotates away from antiparallel alignment with the Fe layer, and into the field direction. Qualitatively similar behavior is observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sample: the (Ga,Mn)As layer is aligned antiparallel to the Fe layer at zero field, although the bias field is lower by approximately a factor of two.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "I. INTRODUCTION\nThe study of low dimensional frustrated magnetic systems 1 still raises great interest, both in consequence of theoretical aspects, related to their peculiar critical properties 2 , and in view of possible technological applications 3 . Indeed, beside conventional ferromagnetic or antiferromagnetic phase transitions, in many new materials other nontrivial and unconventional forms of ordering have been observed 4,5 . A quantity of particular interest in this context is the spin chirality, an order parameter which turned out to be extremely relevant in, e.g., magnetoelectric materials 6 , itinerant MnSi 7 , binary compounds as FeGe 8 , glass transition of spins 9 , and XY helimagnets, as Holmium, Terbium or Dysprosium 10 . In the latter case, a new universality class was predicted because a Z 2 × SO (2) symmetry is spontaneously broken in the ordered phase 2 : In fact, when dealing with such systems, in addition to the SO (2) symmetry of the spin degrees of freedom /vector S i , one has to consider also the Z 2 symmetry of the spin chirality κ ij ∝ [ /vector S i × /vector S j ] z .\nFor these rare-earth elements, the development of new and sophisticated experimental methods 11 has allowed to obtain ultra-thin films where the non-collinear modulation is comparable with the film thickness. Under such conditions the lack of translational invariance due to the presence of surfaces results decisive in order to observe a drastic change of the magnetic structures 12 . Recent experimental data on ultra-thin Holmium films 13 have been lately interpreted and discussed 14,15 on the basis of detailed classical Monte Carlo (MC) simulations of a spin Hamiltonian, which is believed to give a realistic modeling of bulk Holmium. Such Hamiltonian, proposed by Bohr et al. 16 , allows for competitive middle-range in-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nK. Olejnik, 1, 2 P. Wadley, 3 J. Haigh, 3 K. W. Edmonds, 3 R. P. Campion, 3 A. W. Rushforth, 3 B. L. Gallagher, 3 C. T. Foxon, 3 T. Jungwirth, 2, 3 J. Wunderlich, 1, 2 S. S. Dhesi, 4 S. Cavill, 4 G. van der Laan, 4 and E. Arenholz 5\n1 Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom\n2 Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic\n3 School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom 4 Diamond Light Source, Harwell Science and Innovation Campus, Didcot, Oxfordshire, OX11 0DE, United Kingdom Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA\n5 (Dated: August 24, 2018)\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin overlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic circular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface layer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized at room temperature.\nPACS numbers: 75.70.Cn, 75.50.Pp, 75.50.Bb", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nThe interfacial Mn moments are ascribed to the proximity polarization of the (Ga,Mn)As interface by the Fe layer, such as was shown previously by XMCD as well as ab initio theory 7 . Evidence for this can be observed from measurement of the Mn L 2 , 3 XMCD signal at temperatures above the (Ga,Mn)As T C . Similar to the previous study 7 , we observe a small but not negligible signal at room temperature (Fig. 3), with opposite sign to the Fe L 2 , 3 XMCD. Its spectral shape is characteristic of a localized electronic configuration close to d 5 , similar to bulk (Ga,Mn)As 7,9,15 but in contrast to Mn in more metallic environments such as Mn x Fe 1 -x 7 or MnAs 16 . A slight broadening is observed on the low energy side of the Mn L 3 peak, which may be due to the different screening induced by proximity to the Fe layer. Since the measured intensity is attenuated with distance z from the surface as I = I 0 exp( -z/λ TEY ), the thickness of the strongly coupled interface layer is estimated to be ∼ 0.7 nm or 2-3\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. MacDonald, Phys. Rev. B 59 , 9818 (1999); P. Sankowski and P. Kacman, Phys. Rev. B 71 , 201303(R) (2005); A. D. Giddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. B 78 , 165312 (2008); K. Szalowski and T. Balcerzak, Phys. Rev. B 79 , 214430 (2009).", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFIG. 1. (color) Main figure: Major (red/black) and minor (green) hysteresis loops along the [110] axis at 5 K, for a Fe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop for a control (Ga,Mn)As (20 nm) film along the same axis (blue). Left inset: Magnetization versus temperature for the Fe/(Ga,Mn)As film at remanence (black) and under a 500 Oe applied field (red). Right inset: Exchange bias field versus thickness d of the (Ga,Mn)As film (points) and fit showing 1/ d dependence (dashed line).\n/s32\n4\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. Campion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van der Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B 73 , 165205 (2006).\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. Wang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. van der Laan, and E. Arenholz, J. Appl. Phys. 102 , 023902 (2007).\nFIG. 2. (color online) XMCD asymmetry versus applied field along the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As (10 nm) film. (a) Fe L 3 , total electron yield; (b) Mn L 3 , total electron yield; (c) Mn L 3 , fluorescent yield. Black and red points are data for increasing and decreasing fields respectively; lines are to guide the eye.\n/s32\n/s32\n/s32\n5\n/s32", - "page_start": 3, - "page_end": 5, - "source_file": "1001.2449.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "I do not remember on wich samples SQUID magnetometry measurements were first performed", - "target_page": 2, - "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nwhich may further disrupt the interface order. The origin of the interface magnetism then had to be inferred by comparison to a series of reference samples 7 . Demonstration of coupling between the bulk of the layers, i.e. , an exchange bias effect, would provide direct evidence of the interface magnetic order. Moreover, such coupling would offer new means of manipulating the FM semiconductor spin state and utilizing the proximity polarization effect in a spintronic device.\nHere, we demonstrate an antiferromagnetic coupling and exchange bias in Fe/(Ga,Mn)As bilayer films, by combining element-specific XMCD measurements and bulk-sensitive superconducting quantum interference device (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in contrast to AFM coupled FM metal/FM metal exchange bias structures 10,11 ) the layers are in direct contact without a non-magnetic spacer in between. We distinguish interface and bulk (Ga,Mn)As layers that are respectively strongly and weakly antiferromagnetically coupled to the Fe overlayer. In agreement with Ref. 7 , the interface layer remains polarized at room temperature.\nThe Fe and (Ga,Mn)As layers of the present study were both grown by molecular beam epitaxy in the same ultra-high vacuum system, in order to ensure a clean interface between them. The (Ga,Mn)As layer of thickness 10 to 50 nm was deposited on a GaAs(001) substrate at a temperature of 260 · C, using previously established methods 3,8 . A low Mn concentration of x ≈ 0 . 03 was chosen in order to avoid the formation of compensating Mn interstitials. The substrate temperature was then reduced to ∼ 0 · C, before depositing a 2 nm Fe layer, plus a 2 nm Al capping layer. In-situ reflection high energy electron diffraction and ex-situ x-ray reflectivity and diffraction measurements confirmed that the layers are single-crystalline with sub-nm interface roughness. SQUID magnetometry measurements were performed using a Quantum Design Magnetic Property Measurement System. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Statistics\nFor all statistical analyses, confirm that the following items are present in the figure legend, table legend, main text, or Methods section.\nn/a Confirmed\nThe exact sample size ( n ) for each experimental group/condition, given as a discrete number and unit of measurement\nA statement on whether measurements were taken from distinct samples or whether the same sample was measured repeatedly\nThe statistical test(s) used AND whether they are one- or two-sided\nOnly common tests should be described solely by name; describe more complex techniques in the Methods section.\nA description of all covariates tested\nA description of any assumptions or corrections, such as tests of normality and adjustment for multiple comparisons\nA full description of the statistical parameters including central tendency (e.g. means) or other basic estimates (e.g. regression coefficient) AND variation (e.g. standard deviation) or associated estimates of uncertainty (e.g. confidence intervals)\nFor null hypothesis testing, the test statistic (e.g. F , t , r ) with confidence intervals, effect sizes, degrees of freedom and P value noted Give P values as exact values whenever suitable.\nFor Bayesian analysis, information on the choice of priors and Markov chain Monte Carlo settings\nFor hierarchical and complex designs, identification of the appropriate level for tests and full reporting of outcomes\nEstimates of effect sizes (e.g. Cohen's d , Pearson's r ), indicating how they were calculated\nOur web collection on statistics for biologists contains articles on many of the points above.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed4.pdf" - }, - { - "text": "Monitor\n· Logs in CloudWatch\n· Errors and tracing in X-Ray\n· Metrics", - "page_start": 53, - "page_end": 53, - "source_file": "serverless-core.pdf" - }, - { - "text": "2.9. Statistical analysis\nData are expressed as mean 6 SEM unless otherwise specified, and P values of less than 0.05 were considered significant. Power calculations were performed using G*Power 3.1.9.7. 15 A quantitative Venn diagram was created using BioVenn. 25 All other statistical analyses were performed in Prism 10 (GraphPad Software, Inc, Boston, MA) or R using paired t tests or 1- or 2-way RM ANOVAs (repeated measures analysis of variance), where appropriate. Normality was assessed by the Shapiro-Wilk test. If the main analysis of variance effect was significant, ˇ S'ıd 'ak or Tukey multiple comparisons tests were performed. To compare population distributions of soma cross-sectional area or volume, Kolmogorov-Smirnov tests were performed.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "Real-time performance statistics monitoring with the GUI\nThe system's performance is also always visible in the bottom of the IBM Spectrum Virtualize window, as shown in Figure A-4 on page 751.\nNote: The indicated values in the graphics are averaged on a 1 second based sample.\nFigure A-4 IBM Spectrum Virtualize performance window\nYou can also select to view performance statistics for each of the available nodes of the system, as shown in Figure A-5.\nFigure A-5 View statistics per node or for the entire system\nYou can also change the metric between MBps or IOPS, as shown in Figure A-6.\nFigure A-6 View performance metrics by MBps or IOps\nAppendix A. Performance data and statistics gathering\n751\nOn any of these views, you can select any point by using your cursor to know the exact value and when it occurred. When you place your cursor over the timeline, it becomes a dotted line with the various values gathered, as shown in Figure A-7.\nFigure A-7 Viewing performance with details\nFor each of the resources, various metrics are available and you can select which to be displayed. For example, as shown in Figure A-8, from the four available metrics for the MDisks view (Read, Write, Read latency, and Write latency) only Read and Write IOPS are selected.\nFigure A-8 Displaying performance counters", - "page_start": 771, - "page_end": 773, - "source_file": "sg247938.pdf" - }, - { - "text": "Test providers\n3. -(1) A test provider complies with this paragraph where-\n(a) they provide appropriate tests in a single end-to-end testing service (whether or not they arrange with another person ('X') for X to provide one or more elements of the service on their behalf);\n(b) they have made a declaration to the Department of Health and Social Care that they meet the minimum standards for private sector-provided testing at https://support-covid-19testing.dhsc.gov.uk/PrivateSectorSelfDeclaration;\n(c) in relation to a test which requires laboratory processing-\n(i) the person responsible for the taking of samples meets the relevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard 17025, in respect of the taking of samples, and\n(ii) the laboratory used by the test provider for the processing of samples meets the relevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard 17025, in respect of the processing of samples;\n(d) in relation to a point of care test, they meet the relevant requirements for accreditation to ISO standard 15189 and ISO standard 22870( a );\n(e) a registered medical practitioner has oversight and approval of medical practices undertaken by the test provider, and responsibility for reporting medical issues;\n(f) they have an effective system of clinical governance in place which includes appropriate standard operating procedures in relation to the carrying out of appropriate tests;\n(g) a registered clinical scientist has oversight of clinical practices undertaken by the test provider, and responsibility for reporting clinical issues;\n(h) they have systems in place to identify any adverse incidents or quality control issues in relation to appropriate tests and be able to report them as soon as reasonably practicable to the Secretary of State;\n(i) they administer or provide an appropriate test to P, on or after the fifth day after the day on which P arrived in England having received the information required by paragraph 4(b) and (c) (as appropriate); and\n(j) if they arrange with another person ('X') for X to carry out any element of the single end-to-end testing service on their behalf, the test provider ensures that X complies with any of paragraphs (c) to (i) and 5(2), (3) and (5) as is relevant to the carrying out of that element.", - "page_start": 69, - "page_end": 69, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFigure 2(a)-(c) shows the magnetic field dependence of XMCD asymmetry, defined as ( I l -I r ) / ( I l + I r ) where I l ( r ) is the absorption for left- (right-) circularly polarized x-rays. This is measured at the Fe and Mn L 3 absorption peaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. The external field is applied along the photon incidence direction, which is at 70 · to the surface normal with an in-plane projection along the [110] axis. The XMCD data show that the Fe film displays a square hysteresis loop with a single magnetization switch, as expected for a monocrystalline Fe film with strong uniaxial magnetic anisotropy. The Mn XMCD shows a more complicated loop due to the effect of the interlayer coupling. The projected Mn moment aligns antiparallel to the Fe moment at remanence, and undergoes a magnetization reversal of opposite sign to the Fe. With further increase of the external magnetic field, the Mn moment gradually rotates away from antiparallel alignment with the Fe layer, and into the field direction. Qualitatively similar behavior is observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sample: the (Ga,Mn)As layer is aligned antiparallel to the Fe layer at zero field, although the bias field is lower by approximately a factor of two.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Index size calculation\nAlthough the disk space usage depends on the text in each document, this usage is linear to the original size of the indexed data. Typically, the size of the index on the disk is 50% - 150% of the original text size as illustrated in the following formulas:\nminimum disk space = Number of documents x document size x 50%\nmaximum disk space required = Number of documents x document size x 150%\nThe actual percentage, 50% through 150%, is data-dependent. So, an exact number can be obtained only by testing with your data.\nFor example, 100,000 documents of 20 KB each can require about 1500 MB (100,000 x 20 KB x 75%) of disk space.\nTip: To determine the text size for AFP and Line Data documents, extract a sample document and use the arsview server command to determine the text size.\nThe size of the index is not limited. However, when data is added to or removed from a text index, the text index structure is merged to improve query performance. The required processing time to complete the merger depends on several factors, such as index size and absolute throughput (which in turn depends on the data type and index format). These factors result in practical limits on the total text index size.\nFor query performance, the biggest impact is the number of matching results, not the size of the text index.", - "page_start": 364, - "page_end": 364, - "source_file": "sg246915.pdf" - }, - { - "text": "Endocrine procedures\nWhite matter microstructure . DSI Studio's correlational tractography 74 was used to analyze the relationship between white matter structure and gestational week ( n = 16). A truncated model was run to examine the relationship between white matter and sex steroid hormones ( n = 14) for the subset of diffusion scans with paired endocrine data during gestation. A nonparametric Spearman's correlation was used to derive the correlation between gestational week and endocrine factors and our metrics of interest (QA and MD; see Supplementary Table 9 and Supplementary Fig. 10 for MD results) because the data were not normally distributed. Statistical inference was reached using connectometry, a permutation-based approach that tests the strength of coherent associations found between the local connectome and our variables of interest. It provides higher reliability and replicability by correcting for multiple comparisons. This technique provides a high-resolution characterization of local axonal orientation. The correlational tractography was run with the following parameters: t score threshold of 2.5, four pruning iterations and a length threshold of 25 voxel distance. To estimate the FDR, a total of 4,000 randomized permutations were applied to obtain the null distribution of the track length. Reported regions were selected based on FDR cutoff (FDR < 0.2, suggested by DSI Studio), and contained at least ten tracts. For visualization of global and tract QA at each gestational stage, mean QA values were extracted using DSI Studio's whole-brain fiber tracking algorithm and ROI-based tracking using the default HCP842 atlas 78 .\nDay2Day dataset: measurement variability . To establish a marker of normative variability over half a year, we computed metrics of measurement variability using the Day2Day dataset 23 , which provided both whole-brain T1 and high-resolution T2 MTL scans. For each region, j , of the Schaefer parcellation, we assessed across-session variability, ε , as\n̂\nε j = šŠŠ × mean ( | | ts -t | | t )\n̂", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "What are the differences observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes ?", - "target_page": 2, - "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nClear differences are observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes. For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high magnetic fields, whereas for TEY at remanence it is approximately a factor of two larger than at 1000 Oe. The Mn L 2 , 3 XMCD spectra recorded at remanence and at 1000 Oe, shown in Fig. 3, confirm this result. At remanence the FY and TEY detected XMCD have similar magnitudes. However, under a large external field the XMCD is substantially smaller in TEY than in FY, confirming that the net magnetization of the Mn ions near the interface is significantly less than in the bulk of the (Ga,Mn)As film. This is the case even up to the highest field applied (20 kOe). By applying the XMCD sum rules 14 to the TEY data, and by comparing the spectra to previous measurements on well-characterized (Ga,Mn)As\nsamples 15 , the projected Mn 3 d magnetic moments are obtained as -1.4 µ B and +0.8 µ B per ion at remanence and 1000 Oe, respectively.\nThe difference between these values can be understood as being due to an interface layer which is strongly antiferromagnetically coupled to the Fe layer. At zero field, both the interfacial and bulk Mn are aligned antiparallel to the Fe layer. At high fields, the bulk of the (Ga,Mn)As layer away from the interface is re-oriented into the external field direction. However, the interfacial Mn remains antiparallel to the Fe layer and thus partially compensates the XMCD signal from the bulk of the (Ga,Mn)As. From the size of the remanent and 1000 Oe magnetic moments, it can be estimated that around 25-30% of the TEY XMCD signal can be ascribed to the interfacial Mn which is strongly coupled to the Fe moments.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nSimilar behavior is observed for bilayer samples containing a 10 nm or 50 nm (Ga,Mn)As layer, with a bias field which is approximately inversely proportional to the thickness d of the ferromagnetic semiconductor layer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers 4 , and is generally observed in exchanged-biased thin films 12 . From this dependence it is possible to describe the exchange bias in terms of an interface energy per unit area, ∆ E = M FS H E d = 0 . 003 erg/cm 2 . This value is rather small compared to typical exchange bias systems 12 , reflecting the low moment density M FS of the diluted FM semiconductor layer. However, the bias field for a given (Ga,Mn)As thickness is larger than is observed for MnO/(Ga,Mn)As structures 13 , while the reproducibility and flexibility of the present structures is much higher due to the single-crystalline ferromagnetic nature of the Fe layer.\nTo confirm the presence of AFM interlayer coupling, we performed XMCD measurements at the Mn and Fe\n2\nL 2 , 3 absorption edges in order to determine the magnetic response of the individual elements. In L 2 , 3 XMCD, electrons are excited from a 2 p core level to the unoccupied 3 d valence states of the element of interest by circularly polarized x-rays at the resonance energies of the transitions. The difference in absorption for opposite polarizations gives a direct and element-specific measurement of the projection of the 3 d magnetic moment along the xray polarization vector. The absorption cross-section is conventionally obtained by measuring the decay products - either fluorescent x-rays or electrons - of the photoexcited core hole. The type of decay product measured determines the probing depth of the technique. For Mn L 2 , 3 absorption, the probing depths for FY and TEY detection are λ FY ≈ 100 nm and λ TEY ≈ 3 nm. In the current experiment, the Mn XMCD measured using FY and TEY are thus sensitive to the bulk of the (Ga,Mn)As film and the near-interface layers, respectively.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFIG. 3. (color online) (a) Polarization-averaged Mn L 2 , 3 spectrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured in remanence at 2 K; (c) XMCD spectra measured under a 1000 Oe applied field at 2 K; (d) XMCD spectrum measured under a 2000 Oe applied field at 300 K. XMCD spectra are obtained using TEY (thick red lines) and FY (thin blue lines) detection.\n/s32\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFigure 2(a)-(c) shows the magnetic field dependence of XMCD asymmetry, defined as ( I l -I r ) / ( I l + I r ) where I l ( r ) is the absorption for left- (right-) circularly polarized x-rays. This is measured at the Fe and Mn L 3 absorption peaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. The external field is applied along the photon incidence direction, which is at 70 · to the surface normal with an in-plane projection along the [110] axis. The XMCD data show that the Fe film displays a square hysteresis loop with a single magnetization switch, as expected for a monocrystalline Fe film with strong uniaxial magnetic anisotropy. The Mn XMCD shows a more complicated loop due to the effect of the interlayer coupling. The projected Mn moment aligns antiparallel to the Fe moment at remanence, and undergoes a magnetization reversal of opposite sign to the Fe. With further increase of the external magnetic field, the Mn moment gradually rotates away from antiparallel alignment with the Fe layer, and into the field direction. Qualitatively similar behavior is observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sample: the (Ga,Mn)As layer is aligned antiparallel to the Fe layer at zero field, although the bias field is lower by approximately a factor of two.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nThe interfacial Mn moments are ascribed to the proximity polarization of the (Ga,Mn)As interface by the Fe layer, such as was shown previously by XMCD as well as ab initio theory 7 . Evidence for this can be observed from measurement of the Mn L 2 , 3 XMCD signal at temperatures above the (Ga,Mn)As T C . Similar to the previous study 7 , we observe a small but not negligible signal at room temperature (Fig. 3), with opposite sign to the Fe L 2 , 3 XMCD. Its spectral shape is characteristic of a localized electronic configuration close to d 5 , similar to bulk (Ga,Mn)As 7,9,15 but in contrast to Mn in more metallic environments such as Mn x Fe 1 -x 7 or MnAs 16 . A slight broadening is observed on the low energy side of the Mn L 3 peak, which may be due to the different screening induced by proximity to the Fe layer. Since the measured intensity is attenuated with distance z from the surface as I = I 0 exp( -z/λ TEY ), the thickness of the strongly coupled interface layer is estimated to be ∼ 0.7 nm or 2-3\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. MacDonald, Phys. Rev. B 59 , 9818 (1999); P. Sankowski and P. Kacman, Phys. Rev. B 71 , 201303(R) (2005); A. D. Giddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. B 78 , 165312 (2008); K. Szalowski and T. Balcerzak, Phys. Rev. B 79 , 214430 (2009).", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nwhich may further disrupt the interface order. The origin of the interface magnetism then had to be inferred by comparison to a series of reference samples 7 . Demonstration of coupling between the bulk of the layers, i.e. , an exchange bias effect, would provide direct evidence of the interface magnetic order. Moreover, such coupling would offer new means of manipulating the FM semiconductor spin state and utilizing the proximity polarization effect in a spintronic device.\nHere, we demonstrate an antiferromagnetic coupling and exchange bias in Fe/(Ga,Mn)As bilayer films, by combining element-specific XMCD measurements and bulk-sensitive superconducting quantum interference device (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in contrast to AFM coupled FM metal/FM metal exchange bias structures 10,11 ) the layers are in direct contact without a non-magnetic spacer in between. We distinguish interface and bulk (Ga,Mn)As layers that are respectively strongly and weakly antiferromagnetically coupled to the Fe overlayer. In agreement with Ref. 7 , the interface layer remains polarized at room temperature.\nThe Fe and (Ga,Mn)As layers of the present study were both grown by molecular beam epitaxy in the same ultra-high vacuum system, in order to ensure a clean interface between them. The (Ga,Mn)As layer of thickness 10 to 50 nm was deposited on a GaAs(001) substrate at a temperature of 260 · C, using previously established methods 3,8 . A low Mn concentration of x ≈ 0 . 03 was chosen in order to avoid the formation of compensating Mn interstitials. The substrate temperature was then reduced to ∼ 0 · C, before depositing a 2 nm Fe layer, plus a 2 nm Al capping layer. In-situ reflection high energy electron diffraction and ex-situ x-ray reflectivity and diffraction measurements confirmed that the layers are single-crystalline with sub-nm interface roughness. SQUID magnetometry measurements were performed using a Quantum Design Magnetic Property Measurement System. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Endocrine procedures\nMRI acquisition . MRI scanning sessions at the University of California, Santa Barbara and Irvine were conducted on 3T Prisma scanners equipped with 64-channel phased-array head/neck coil (of which 50 coils are used for axial brain imaging). High-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms, time to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms, TE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w) turbo spin echo scan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus (TR/ TE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm 2 in-plane resolution, 2-mm slice thickness, 38 interleaved slices with no gap, total acquisition time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI) protocol sampled the entire brain with the following parameters: single phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions, b -max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm voxel resolution. These images were linearly registered to the whole-brain T1w MPRAGE image. A custom foam headcase was used to provide extra padding around the head and neck, as well as to minimize head motion. Additionally, a custom-built sound-absorbing foam girdle was placed around the participant's waist to attenuate sound near the fetus during second-trimester and third-trimester scanning.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFIG. 1. (color) Main figure: Major (red/black) and minor (green) hysteresis loops along the [110] axis at 5 K, for a Fe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop for a control (Ga,Mn)As (20 nm) film along the same axis (blue). Left inset: Magnetization versus temperature for the Fe/(Ga,Mn)As film at remanence (black) and under a 500 Oe applied field (red). Right inset: Exchange bias field versus thickness d of the (Ga,Mn)As film (points) and fit showing 1/ d dependence (dashed line).\n/s32\n4\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. Campion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van der Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B 73 , 165205 (2006).\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. Wang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. van der Laan, and E. Arenholz, J. Appl. Phys. 102 , 023902 (2007).\nFIG. 2. (color online) XMCD asymmetry versus applied field along the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As (10 nm) film. (a) Fe L 3 , total electron yield; (b) Mn L 3 , total electron yield; (c) Mn L 3 , fluorescent yield. Black and red points are data for increasing and decreasing fields respectively; lines are to guide the eye.\n/s32\n/s32\n/s32\n5\n/s32", - "page_start": 3, - "page_end": 5, - "source_file": "1001.2449.pdf" - }, - { - "text": "Image mode\nImage mode is an access mode that establishes a one-to-one mapping of extents in the storage pool (existing LUN or (image mode) MDisk) with the extents in the volume. See also 'Managed mode' on page 780 and 'Unmanaged mode' on page 787.", - "page_start": 799, - "page_end": 799, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What is Kingsgate ?", - "target_page": 2, - "target_passage": "Kingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "Operations Report\nwww.kingsgate.com.au\nu", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Convertible loan facility\nKingsgate has a five year A$35 million convertible loan facility with Investec entered into in a prior period to provide funding for the Bowdens acquisition. Kingsgate has the option to make a prepayment against the facility with an issue of Kingsgate shares.", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Registered Office & Principal Business Address\nKingsgate Consolidated Limited\nSuite 801, Level 8, 14 Martin Place Sydney NSW 2000 Australia\nTel:\n+61 2 8256 4800\nFax:\n+61 2 8256 4810\nEmail: info@kingsgate.com.au\nwww.kingsgate.com.au www.kingsgate.com.au", - "page_start": 117, - "page_end": 117, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Senior Management\nKingsgate's executives have a comprehensive range of skills and experience including mine development and operations, exploration, finance and administration. They are supported by highly qualified specialists, whose backgrounds cover the full scope of mining resources activities.\nSenior members of Kingsgate's management team are:", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "2013 Annual Report\ncontinued\nu\nTHAI LA ND\nwww.kingsgate.com.au\nKingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects. Shareholders can look forward to the benefits of this strong operating and development platform, where Kingsgate aims to build value though operating, earnings and dividend growth for the benefit of all stakeholders.\nAUST RA LI\nA\n1\nContents", - "page_start": 0, - "page_end": 2, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Corporate Information\nKingsgate Consolidated Limited ABN 42 000 837 472", - "page_start": 117, - "page_end": 117, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Investments in subsidiaries\nInvestments in subsidiaries are accounted for at cost in the financial statements of Kingsgate.", - "page_start": 76, - "page_end": 76, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Performance rights\nThe number of performance rights held during the financial year by each Director of Kingsgate and each of the specified executives of the Group, including their personally-related entities, are set out as follows:", - "page_start": 108, - "page_end": 108, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Exploration commitments\nshares = Ordinary. Yilgarn Metals Limited, Equity holding.2013 % = 100. Yilgarn Metals Limited, Equity holding.2012 % = 100. Kingsgate Treasury Pty Ltd(iii), Country of Incorporation = Australia. Kingsgate Treasury Pty Ltd(iii), Class of shares = Ordinary. Kingsgate Treasury Pty Ltd(iii), Equity holding.2013 % = 100. Kingsgate Treasury Pty Ltd(iii), Equity holding.2012 % = 100. Kingsgate Bowdens Pty Limited, Country of Incorporation = Australia. Kingsgate Bowdens Pty Limited, Class of shares = Ordinary. Kingsgate Bowdens Pty Limited, Equity holding.2013 % = 100. Kingsgate Bowdens Pty Limited, Equity holding.2012 % = 100. Kingsgate Capital Pty Ltd, Country of Incorporation = Australia. Kingsgate Capital Pty Ltd, Class of shares = Ordinary. Kingsgate Capital Pty Ltd, Equity holding.2013 % = 100. Kingsgate Capital Pty Ltd, Equity holding.2012 % = 100. Kingsgate Nominees Pty Limited, Country of Incorporation = Australia. Kingsgate Nominees Pty Limited, Class of shares = Ordinary. Kingsgate Nominees Pty Limited, Equity holding.2013 % = 100. Kingsgate Nominees Pty Limited, Equity holding.2012 % = 100. Kingsgate South America Pty Ltd, Country of Incorporation = Australia. Kingsgate South America Pty Ltd, Class of shares = Ordinary. Kingsgate South America Pty Ltd, Equity holding.2013 % = 100. Kingsgate South America Pty Ltd, Equity holding.2012 % = 100. Laguna Resources NL, Country of Incorporation = Australia. Laguna Resources NL, Class of shares = Ordinary. Laguna Resources NL, Equity holding.2013 % = 100. Laguna Resources NL, Equity holding.2012 % = 100. Laguna Exploration Pty Ltd, Country of Incorporation = Australia. Laguna Exploration Pty Ltd, Class of shares = Ordinary. Laguna Exploration Pty Ltd, Equity holding.2013 % = 100. Laguna Exploration Pty Ltd, Equity holding.2012 % = 100. Akara Mining Limited (iv), Country of Incorporation = Thailand. Akara Mining Limited (iv), Class of shares = Ordinary. Akara Mining Limited (iv), Equity holding.2013 % = 100. Akara Mining Limited (iv), Equity holding.2012 % = 100. Issara Mining Ltd, Country of Incorporation = Thailand. Issara Mining Ltd, Class of", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Notes to the Financial Statements\nfor the year ended 30 June 2013\nThe Financial Report of Kingsgate Consolidated Limited (Kingsgate or the 'Company') for the year ended 30 June 2013 was authorised for issue in accordance with a resolution of Directors on 23 September 2013.\nKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities Exchange using the ASX code KCN. The consolidated financial statements of the Company as at and for the year ended 30 June 2013 comprise the Company and its subsidiaries (together referred to as the 'Group' and individually as 'Group entities'). A description of the nature of the Group's operations and its principal activities is included in the Directors' Report.", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What does demonstatre the feasibility study on the Nueva Esperanza Project ?", - "target_page": 6, - "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Nueva Esperanza\nThe Nueva Esperanza Project was advanced during the year with the completion of a draft feasibility study. This study included a decision to mine the Arqueros and Teterita portions of Nueva Esperanza. The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns.\nAs a consequence, feasibility work has transitioned to assess a lower capital cost and lower power requirement options, namely the potential for heap leach processing. Metallurgical testwork recently completed demonstrated that processing of mineralisation from all three deposits by heap leaching has the potential to be technically and economically feasible and as a consequence may become the preferred alternative for development.\nEnvironmental approval for the original Arqueros Project was granted in July 2013.", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Nueva Esperanza Silver / Gold Project\nThe Nueva Esperanza Silver / Gold Project advanced during the year with an initial scoping study for a decision to mine the Arqueros and Teterita portions of Nueva Esperanza completed in late 2012. The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible although high capital and power costs negatively impacted project economic returns.\nAs a consequence, feasibility work has transitioned to assess a lower capital cost and lower power requirement option, namely the potential for heap leach processing. Recently completed metallurgical testwork demonstrated that processing of mineralisation from all three deposits by heap leaching has the potential to be technically and economically feasible and, as a consequence, may become the preferred alternative for development.\nEnvironmental approval for the original Arqueros Project was granted in July 2013.", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Prepayments\nNon-current prepayments include prepaid royalties in respect of the Nueva Esperanza Silver / Gold Project in Chile and electricity and fuel supplies for Chatree Mine in Thailand.", - "page_start": 86, - "page_end": 86, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Nueva Esperanza and Bowdens Mineral Resources\nNueva Esperanza, Category = Measured. Nueva Esperanza, Tonnes (Million) = 1.5. Nueva Esperanza, Grade.Gold (g/t) = 0.01. Nueva Esperanza, Grade.Silver (g/t) = 101. Nueva Esperanza, Grade.Lead (%) = -. Nueva Esperanza, Grade.Zinc (%) = -. Nueva Esperanza, Grade.Au Equiv (g/t) = 1.69. Nueva Esperanza, Grade.Ag Equiv (g/t) = 102. Nueva Esperanza, Contained Metal.Gold (M oz) = 0.00. Nueva Esperanza, Contained Metal.Silver (M oz) = 4.9. Nueva Esperanza, Contained Metal.Au Equiv (M oz) = 0.08. Nueva Esperanza, Contained Metal.Ag Equiv (M oz) = 4.9. , Category = Indicated. , Tonnes (Million) = 21.3. , Grade.Gold (g/t) = 0.28. , Grade.Silver (g/t) = 88. , Grade.Lead (%) = -. , Grade.Zinc (%) = -. , Grade.Au Equiv (g/t) = 1.75. , Grade.Ag Equiv (g/t) = 105. , Contained Metal.Gold (M oz) = 0.19. , Contained Metal.Silver (M oz) = 60.3. , Contained Metal.Au Equiv (M oz) = 1.20. , Contained Metal.Ag Equiv (M oz) = 71.8. , Category = Inferred. , Tonnes (Million) = 6.1. , Grade.Gold (g/t) = 0.3. , Grade.Silver (g/t) = 68. , Grade.Lead (%) = -. , Grade.Zinc (%) = -. , Grade.Au Equiv (g/t) = 1.43. , Grade.Ag Equiv (g/t) = 86. , Contained Metal.Gold (M oz) = 0.06. , Contained Metal.Silver (M oz) = 13.3. , Contained Metal.Au Equiv", - "page_start": 33, - "page_end": 33, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Summary\nThe Nueva Esperanza Project is 100% owned by Kingsgate since February 2012. Nueva Esperanza is located in the Maricunga Gold Belt near Copiapó, a regional mining centre in Northern Chile. The silver-rich mineralisation is hosted by the Esperanza high-sulphidation epithermal alteration system associated with the Cerros Bravos volcanic complex.\nThe project consists of three well-defined mineralised deposits and a number of undeveloped exploration targets. The main deposits are Arqueros, Chimberos and Teterita. Arqueros was previously mined on a limited scale by underground methods and Chimberos was exploited as an open pit mine, delivering about 40 million ounces of silver in 1998/99. All three deposits currently have a combined Mineral Resources of about 93 million ounces of silver equivalent or 1.6 million ounces of gold equivalent (EQ60) 1 .\nA feasibility study for a decision to mine the Arqueros portion of Nueva Esperanza was completed in late 2012, demonstrating that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible. Work remained to integrate the Teterita and Chimberos deposits into the project, as well as to test lower cost options for processing. Continued metallurgical testwork has shown that mineralisation from all three deposits by heap leaching is technically and economically feasible and the preferred alternative for development.\nEnvironmental approvals to commence construction and mining at Nueva Esperanza were granted in July 2013 for the original Arqueros project. Work is underway to modify and update the environmental assessment to incorporate the heap leach process.\n1 Equivalence is based on gold/silver price ratio of 60. Gold equivalence = gold content plus (silver content divided by 60), whereas Silver equivalent silver content plus (gold content multiplied by 60).", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Project and user\nA project, sometimes referred to as a tenant , is a unit of ownership. Most resources, such as virtual machines, volumes, and images, belong to a specific project. Only users with a role assignment for a specific project can work with the resources that belong to that project. The ibm-default project is created during installation, but PowerVC supports the creation of more projects for resource segregation.\nWhen possible, it is recommended to create a user and project for the OpenShift environment.", - "page_start": 99, - "page_end": 99, - "source_file": "sg248459.pdf" - }, - { - "text": "Likely developments and expected results of operations\nThe outlook for the Group in fiscal year 2014 is for gold production to be in the range of 190,000 to 210,000 ounces. At the Chatree Mine in Thailand, the expanded plant will result in gold production of between 120,000 to 130,000 ounces and at the Challenger Mine in South Australia, following the implementation of the new mine plan, production for the year is expected to be in the range of 70,000 ounces to 80,000 ounces of gold.\nSignificant progress has been made at Nueva Esperanza in Chile. The feasibility work shifted to focus on identifying a lower cost and power consumption development alternative. This included assessing a heap leach process option and on-site power generation. Further work is expected to be undertaken in the December quarter 2013.\nThe DFS for the Bowdens Silver Project in New South Wales is currently expected to be completed during the 2014 financial year and, in addition, it is also currently anticipated an EIS will be lodged shortly thereafter.", - "page_start": 48, - "page_end": 48, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "4. Segment information\nThe Group's operating segments are based on the internal management reports that are reviewed and used by the Board of Directors (chief operating decision maker). The operating segments represent the Group's operating mines and projects and include the following:\n〉 Chatree Mine, Thailand;\n〉 Challenger Mine, South Australia, Australia;\n〉 Bowdens Silver Project, New South Wales, Australia;\n〉 Nueva Esperanza Silver / Gold Project, Chile; and\n〉 Exploration, South East Asia.\nInformation regarding the results of each reportable segment is included as follows:\n77\nNotes to the Financial Statements", - "page_start": 77, - "page_end": 78, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Revenue\nRevenue, and hence operating margins, are exposed to fluctuations including currency in the gold price and to a degree in the silver price. Management continually monitors operating margins and responds to changes to commodity prices as necessary to address this risk, including reviewing mine plans and entering into forward gold sale contracts.\nChanges in the gold and silver price also impact assessments of the feasibility of exploration and the Group's two development projects, Nueva Esperanza and Bowdens.", - "page_start": 46, - "page_end": 46, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Chairman's Review\nChallenger gold production of 66,216 ounces was 24 percent lower than last year due to additional dilution and depletion at Challenger Deeps and a shortfall in planned development. Following the fall in the gold price, a strategic review of Challenger was implemented that has resulted in a new mine plan to focus primarily on the higher grade Challenger West orebody. The new mine plan will be implemented during the first three months of the 2014 financial year.\nThe development projects continued to advance during the year. At Nueva Esperanza, the feasibility work shifted to focus on identifying the lowest cost and lowest power consumption development alternatives. This included reviewing a heap leach process option with on-site power generation. Further work is expected to be completed in the current financial year. At Bowdens, the feasibility work has confirmed the optimum process route. Completion of the technical feasibility study including mine planning, infrastructure and metallurgy, and lodging of the Environmental Impact Statement ('EIS') are scheduled for 2014.\nThe Board of Kingsgate is determined to reestablish the path to building shareholder wealth via profits and dividends despite a difficult external environment. Shareholders can look forward to a steady performance from Chatree and a turn-around at Challenger coupled with the completion of feasibility studies at the two major development projects over the coming year.\nI would also like to thank our Chief Executive Officer and Managing Director, Gavin Thomas, Kingsgate management and all of the Kingsgate, Akara and Challenger personnel and the project teams for their part in delivering the operational performance during what was a difficult year for your Company.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What is the Kingsgate net cash outflows from finiancing activities in 2013 ?", - "target_page": 11, - "target_passage": " Net cash outflows from financing activities was $1.7 million", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Convertible loan facility\nKingsgate has a five year A$35 million convertible loan facility with Investec entered into in a prior period to provide funding for the Bowdens acquisition. Kingsgate has the option to make a prepayment against the facility with an issue of Kingsgate shares.", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Operations Report\nwww.kingsgate.com.au\nu", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Cash flow\nOperating cash inflow was $85,020,000. Net investing cash outflow was $142,425,000. Net cash outflows from financing activities was $1,691,000, including a drawdown (net of transaction costs) of $36,700,000 of the multicurrency and syndicated loan facilities following a loan restructure by Kingsgate's Thai subsidiary Akara Resources Public Company Limited ('Akara'), net repayment (net of transaction costs) of $20,000,000 of the corporate loan facility, and $19,409,000 dividends paid during the year.", - "page_start": 46, - "page_end": 46, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Investments in subsidiaries\nInvestments in subsidiaries are accounted for at cost in the financial statements of Kingsgate.", - "page_start": 76, - "page_end": 76, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Notes to the Financial Statements\nfor the year ended 30 June 2013\nThe Financial Report of Kingsgate Consolidated Limited (Kingsgate or the 'Company') for the year ended 30 June 2013 was authorised for issue in accordance with a resolution of Directors on 23 September 2013.\nKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities Exchange using the ASX code KCN. The consolidated financial statements of the Company as at and for the year ended 30 June 2013 comprise the Company and its subsidiaries (together referred to as the 'Group' and individually as 'Group entities'). A description of the nature of the Group's operations and its principal activities is included in the Directors' Report.", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Senior Management\nKingsgate's executives have a comprehensive range of skills and experience including mine development and operations, exploration, finance and administration. They are supported by highly qualified specialists, whose backgrounds cover the full scope of mining resources activities.\nSenior members of Kingsgate's management team are:", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Performance rights\nThe number of performance rights held during the financial year by each Director of Kingsgate and each of the specified executives of the Group, including their personally-related entities, are set out as follows:", - "page_start": 108, - "page_end": 108, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Share holdings\nThe number of shares in the Company held during the financial year by each Director of Kingsgate and each of the other Key Management Personnel of the Group, including their personally-related entities are set out as follows:", - "page_start": 106, - "page_end": 106, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Registered Office & Principal Business Address\nKingsgate Consolidated Limited\nSuite 801, Level 8, 14 Martin Place Sydney NSW 2000 Australia\nTel:\n+61 2 8256 4800\nFax:\n+61 2 8256 4810\nEmail: info@kingsgate.com.au\nwww.kingsgate.com.au www.kingsgate.com.au", - "page_start": 117, - "page_end": 117, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Exploration commitments\nshares = Ordinary. Yilgarn Metals Limited, Equity holding.2013 % = 100. Yilgarn Metals Limited, Equity holding.2012 % = 100. Kingsgate Treasury Pty Ltd(iii), Country of Incorporation = Australia. Kingsgate Treasury Pty Ltd(iii), Class of shares = Ordinary. Kingsgate Treasury Pty Ltd(iii), Equity holding.2013 % = 100. Kingsgate Treasury Pty Ltd(iii), Equity holding.2012 % = 100. Kingsgate Bowdens Pty Limited, Country of Incorporation = Australia. Kingsgate Bowdens Pty Limited, Class of shares = Ordinary. Kingsgate Bowdens Pty Limited, Equity holding.2013 % = 100. Kingsgate Bowdens Pty Limited, Equity holding.2012 % = 100. Kingsgate Capital Pty Ltd, Country of Incorporation = Australia. Kingsgate Capital Pty Ltd, Class of shares = Ordinary. Kingsgate Capital Pty Ltd, Equity holding.2013 % = 100. Kingsgate Capital Pty Ltd, Equity holding.2012 % = 100. Kingsgate Nominees Pty Limited, Country of Incorporation = Australia. Kingsgate Nominees Pty Limited, Class of shares = Ordinary. Kingsgate Nominees Pty Limited, Equity holding.2013 % = 100. Kingsgate Nominees Pty Limited, Equity holding.2012 % = 100. Kingsgate South America Pty Ltd, Country of Incorporation = Australia. Kingsgate South America Pty Ltd, Class of shares = Ordinary. Kingsgate South America Pty Ltd, Equity holding.2013 % = 100. Kingsgate South America Pty Ltd, Equity holding.2012 % = 100. Laguna Resources NL, Country of Incorporation = Australia. Laguna Resources NL, Class of shares = Ordinary. Laguna Resources NL, Equity holding.2013 % = 100. Laguna Resources NL, Equity holding.2012 % = 100. Laguna Exploration Pty Ltd, Country of Incorporation = Australia. Laguna Exploration Pty Ltd, Class of shares = Ordinary. Laguna Exploration Pty Ltd, Equity holding.2013 % = 100. Laguna Exploration Pty Ltd, Equity holding.2012 % = 100. Akara Mining Limited (iv), Country of Incorporation = Thailand. Akara Mining Limited (iv), Class of shares = Ordinary. Akara Mining Limited (iv), Equity holding.2013 % = 100. Akara Mining Limited (iv), Equity holding.2012 % = 100. Issara Mining Ltd, Country of Incorporation = Thailand. Issara Mining Ltd, Class of", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": "To which countries extend the marriage regulations ?", - "target_page": 1, - "target_passage": "These Regulations extend to England and Wales. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Citation, commencement, extent and interpretation\n1. -(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and Chapels) Regulations 2021.\n(2) These Regulations come into force on 4th May 2021.\n(3) These Regulations extend to England and Wales.\n(4) In these Regulations, 'chapel' does not include a chapel to which Part 5 of the Marriage Act 1949 (marriages in naval, military and air force chapels) applies( b ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "MARRIAGE, ENGLAND AND WALES\nThe Marriage (Keeping of Records in Churches and Chapels) Regulations 2021\nMade\n-\n-\n-\n-\n29th April 2021\nComing into force - -\n4th May 2021\nThe Registrar General makes these Regulations with the approval of the Secretary of State in exercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act 1949( a ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations provide for records of marriages to be kept in churches and chapels of the Church of England and the Church in Wales, other than chapels to which Part 5 of the Marriage Act 1949 applies (naval, military and air force chapels).\nRegulation 2 requires parochial church councils to provide books known as 'registers of marriage services' to churches and chapels in their parish in which banns of matrimony may be published, for the purposes of keeping the records required by regulation 3. Regulation 2 also imposes requirements relating to the durability and pre-printed content of these registers, and provides that they belong to the parochial church council.\nRegulation 3 requires specified information to be recorded in a register of marriage services when a marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of England or Church in Wales in a church or chapel in which banns of matrimony may be published. The record must be made and signed by the member of the clergy by whom the marriage was solemnized.\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services provided under regulation 2.\nA full impact assessment has not been produced for this instrument because no, or no significant, impact on the private, public or voluntary sector is foreseen.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nhttp://www.legislation.gov.uk/id/uksi/2021/538", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations make amendments to secondary legislation relating to special educational needs and disability in order to provide exceptions to time limits set out in that legislation where they cannot be met because of a reason relating to the incidence or transmission of coronavirus.\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review the effectiveness of the Regulations during the period in which they have effect. The Regulations cease to have effect on 25th September 2020.\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 ('the SEND Regulations 2014').\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain requirements in those Regulations for actions to be taken within specified time limits where it is not reasonably practicable for a person to meet those requirements for a reason relating to the incidence or transmission of coronavirus. Instead, any such requirement is to be read as a requirement for such action to be taken as soon as reasonably practicable.\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 ('the Personal Budgets Regulations 2014').\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as regulation 5 does in respect of the SEND Regulations 2014.\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) Regulations 2015 ('the Detained Persons Regulations 2015').\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to the ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal Budgets Regulations 2014 respectively.\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax time limits.\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017 ('the First-tier Tribunal Regulations 2017').\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to those in regulations 5, 17 and 20.\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency measure and no significant impact on business, charities or voluntary bodies is foreseen.\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n' Crown copyright 2020", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Duty to record information about marriages solemnized according to the rites of the Church of England or Church in Wales\n3. -(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the rites of the Church of England in a church or chapel in which banns of matrimony may be published.\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the marriage was solemnized must make a record of the following information in relation to that marriage in a register of marriage services provided to the church or chapel under regulation 2(1)-\n(a) the date and place of the marriage;\n(b) the name and surname of each party;\n(c) the date of birth of each party;\n(d) the occupation (if any) of each party;\n(e) the address of each party at the time of the marriage;\n(f) the names and surnames of each party's parents, so far as those names and surnames are known to the clergyman who solemnized the marriage;\n(g) the name and surname of each of the witnesses in whose presence the marriage was solemnized;\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n(3) The clergyman must record the information required by paragraph (2) in English, and may also record information required by that paragraph in Welsh where the church or chapel is situated in Wales.\n(4) After making a record under paragraph (2) the clergyman must sign it.\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Duty of parochial church councils to provide registers of marriage services\n2. -(1) The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England( c ) in that parish in which banns of matrimony may be published.\n(2) Books provided under paragraph (1) are to be known as 'registers of marriage services'.\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of paragraphs (4) and (5).\n(4) The register must be made of durable material.\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect of a marriage, the register must be printed in such a way that it-\n( a ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by paragraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently renumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic Storage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act 2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also inserted subsection (1A).\n( b ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to the Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n( c ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including references to the Church in Wales.\n(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of regulation 3(2) in relation to the marriage, and\n(b) provides corresponding spaces for recording information required by each of those subparagraphs in relation to the marriage.\n(6) A register of marriage services provided under paragraph (1) by a parochial church council belongs to that parochial church council.", - "page_start": 0, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThe Regulations amend the International Tax Compliance Regulations 2015 ('the principal Regulations') which give effect to agreements and arrangements reached between the United Kingdom and other jurisdictions to improve international tax compliance.\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into by the United Kingdom for the exchange of financial account information with other jurisdictions up to 19th April 2020, the date before the Regulations are made.\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation 2(4)(b) amends the definitions of 'new account' and 'pre-existing account' in relation to those\n( a ) 'Financial account' and 'reporting financial institution' are defined in the table in regulation 24(2) of the principal Regulations.\n( b ) 'The DAC' is defined in regulation 1(3)(a) of the principal Regulations.\n2\naccounts so that these terms are defined by reference to the date that those accounts ceased to be excluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts which were previously excluded accounts.\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-theuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the impacts that apply to this instrument.\n' Crown copyright 2020\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nUK202004201005 04/2020 19585\nhttp://www.legislation.gov.uk/id/uksi/2020/438", - "page_start": 1, - "page_end": 3, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "Transitional provision\n1. Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to regulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations') in advance of arrival in England is treated as passenger information provided for the purposes of these Regulations where the person arrives in England on or after that date.\n2. Confirmation given by the Foreign, Commonwealth and Development Office that a person is not required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that the person is not required to comply with regulation 6 of these Regulations where the person arrives in England on or after 4.00 a.m. on 17th May 2021.\n3. A designation by the Secretary of State of a person as an authorised person under regulation 5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person under of regulation 11(11)(c) of these Regulations.\n4. Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who exercises the powers in that regulation in relation to a person who arrived in England before 4.00 a.m. on 17th May 2021.\n( a ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.\n89", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Citation, commencement, extent and application\n1. -(1) These Regulations may be cited as the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021.\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n(3) These Regulations extend to England and Wales and apply in relation to England only.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Consequential Amendments\n1. -(1) The Health Protection (Notification) Regulations 2010( a ) are amended as follows.\n(2) In regulation 4(3D)(b), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n( a ) S.I. 2010/659. Regulations 4(3D) and 4ZA were inserted by S.I. 2021/150. There are other amendments but none is relevant.\n88", - "page_start": 87, - "page_end": 87, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": "What the parochial church council must provide to make marriage records ?", - "target_page": 1, - "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations provide for records of marriages to be kept in churches and chapels of the Church of England and the Church in Wales, other than chapels to which Part 5 of the Marriage Act 1949 applies (naval, military and air force chapels).\nRegulation 2 requires parochial church councils to provide books known as 'registers of marriage services' to churches and chapels in their parish in which banns of matrimony may be published, for the purposes of keeping the records required by regulation 3. Regulation 2 also imposes requirements relating to the durability and pre-printed content of these registers, and provides that they belong to the parochial church council.\nRegulation 3 requires specified information to be recorded in a register of marriage services when a marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of England or Church in Wales in a church or chapel in which banns of matrimony may be published. The record must be made and signed by the member of the clergy by whom the marriage was solemnized.\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services provided under regulation 2.\nA full impact assessment has not been produced for this instrument because no, or no significant, impact on the private, public or voluntary sector is foreseen.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nhttp://www.legislation.gov.uk/id/uksi/2021/538", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Duty of parochial church councils to provide registers of marriage services\n2. -(1) The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England( c ) in that parish in which banns of matrimony may be published.\n(2) Books provided under paragraph (1) are to be known as 'registers of marriage services'.\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of paragraphs (4) and (5).\n(4) The register must be made of durable material.\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect of a marriage, the register must be printed in such a way that it-\n( a ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by paragraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently renumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic Storage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act 2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also inserted subsection (1A).\n( b ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to the Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n( c ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including references to the Church in Wales.\n(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of regulation 3(2) in relation to the marriage, and\n(b) provides corresponding spaces for recording information required by each of those subparagraphs in relation to the marriage.\n(6) A register of marriage services provided under paragraph (1) by a parochial church council belongs to that parochial church council.", - "page_start": 0, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Duty to record information about marriages solemnized according to the rites of the Church of England or Church in Wales\n3. -(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the rites of the Church of England in a church or chapel in which banns of matrimony may be published.\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the marriage was solemnized must make a record of the following information in relation to that marriage in a register of marriage services provided to the church or chapel under regulation 2(1)-\n(a) the date and place of the marriage;\n(b) the name and surname of each party;\n(c) the date of birth of each party;\n(d) the occupation (if any) of each party;\n(e) the address of each party at the time of the marriage;\n(f) the names and surnames of each party's parents, so far as those names and surnames are known to the clergyman who solemnized the marriage;\n(g) the name and surname of each of the witnesses in whose presence the marriage was solemnized;\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n(3) The clergyman must record the information required by paragraph (2) in English, and may also record information required by that paragraph in Welsh where the church or chapel is situated in Wales.\n(4) After making a record under paragraph (2) the clergyman must sign it.\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Requirements about the keeping of registers of marriage services\n4. -(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1) must-\n(a) ensure that the register is kept in that church or chapel, and\n(b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1), the obligations under paragraph (1) in respect of that register fall on the churchwardens of the parish in which the church or chapel is situated.\nGiven under my hand on 29th April 2021\nAbi Tierney Registrar General\n2\nI approve\n29th April 2021\nKevin Foster Parliamentary Under Secretary of State Home Office", - "page_start": 1, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "MARRIAGE, ENGLAND AND WALES\nThe Marriage (Keeping of Records in Churches and Chapels) Regulations 2021\nMade\n-\n-\n-\n-\n29th April 2021\nComing into force - -\n4th May 2021\nThe Registrar General makes these Regulations with the approval of the Secretary of State in exercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act 1949( a ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Citation, commencement, extent and interpretation\n1. -(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and Chapels) Regulations 2021.\n(2) These Regulations come into force on 4th May 2021.\n(3) These Regulations extend to England and Wales.\n(4) In these Regulations, 'chapel' does not include a chapel to which Part 5 of the Marriage Act 1949 (marriages in naval, military and air force chapels) applies( b ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Relations with the major colonies\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France was a patchwork of legal systems, with as many traditional legal regimes as there were provinces, and two co-existing legal systems-customary law in the north and Roman civil law in the south. [36] The Grande Ordonnance de Procédure Civile of 1667, the Code Louis , was a comprehensive legal code imposing a uniform regulation of civil procedure throughout the kingdom. Among other things, it prescribed baptismal, marriage and death records in the state's registers, not the church's, and it strictly regulated the right of the Parlements to remonstrate. [37] The Code Louis later became the basis for the Napoleonic code, which in turn inspired many modern legal codes.\nOne of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code). Although it sanctioned slavery, it attempted to humanise the practice by prohibiting the separation of families. Additionally, in the colonies, only Roman Catholics could own slaves, and these had to be baptised.\nLouis ruled through a number of councils:\nConseil d'en haut (\"High Council\", concerning the most important matters of state)-composed of the king, the crown prince, the controller-general of finances, and the secretaries of state in charge of various departments. The members of that council were called ministers of state.\nLouis and his family portrayed as Roman gods in a 1670 painting by Jean Nocret. L to R: Louis's aunt, Henriette-Marie; his brother, Philippe, duc d'Orléans; the Duke's daughter, Marie Louise d'Orléans, and wife, Henriette-Anne Stuart; the Queen-mother, Anne of Austria; three daughters of Gaston d'Orléans; Louis XIV; the Dauphin Louis; Queen Marie-Thérèse; la Grande Mademoiselle .\nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces).\nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments).\nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an honorary post in most cases)-this was one of the few posts in the council available to the high aristocracy. [38]", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Piety and religion\nLouis was a pious and devout king who saw himself as the head and protector of the Catholic Church in France. He made his devotions daily regardless of where he was, following the liturgical calendar regularly. [107] Under the influence of his very religious second wife, he became much stronger in the practice of his Catholic faith. [108] This included banning opera and comedy performances during Lent. [108]\nTowards the middle and the end of his reign, the centre for the King's religious observances was usually the Chapelle Royale at Versailles. Ostentation was a distinguishing feature of daily Mass, annual celebrations, such as those of Holy Week, and special ceremonies. [109] Louis established the Paris Foreign Missions Society, but his informal alliance with the Ottoman Empire was criticised for undermining Christendom. [110]\nLouis XIV encouraged Catholic missions through the creation of the Paris Foreign Missions Society", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Edict of Fontainebleau\nLouis decided to persecute Protestants and revoke the 1598 Edict of Nantes, which awarded Huguenots political and religious freedom. He saw the persistence of Protestantism as a disgraceful reminder of royal powerlessness. After all, the Edict was the pragmatic concession of his grandfather Henry IV to end the longstanding French Wars of Religion. An additional factor in Louis's thinking was the prevailing contemporary European principle to assure socio-political stability, cuius regio, eius religio (\"whose realm, his religion\"), the idea that the religion of the ruler should be the religion of the realm (as originally confirmed in central Europe in the Peace of Augsburg of 1555). [67]\nResponding to petitions, Louis initially excluded Protestants from office, constrained the meeting of synods, closed churches outside of Edict-stipulated areas, banned Protestant outdoor preachers, and prohibited domestic Protestant migration. He also disallowed Protestant-Catholic intermarriages to which third parties objected, encouraged missions to the Protestants, and\nLouis XIV in 1685, the year he revoked the Edict of Nantes\nrewarded converts to Catholicism. [68] This discrimination did not encounter much Protestant resistance, and a steady conversion of Protestants occurred, especially among the noble elites.\nIn 1681, Louis dramatically increased his persecution of Protestants. The principle of cuius regio, eius religio generally also meant that subjects who refused to convert could emigrate, but Louis banned emigration and effectively insisted that all Protestants must be converted. Secondly, following the proposal of René de Marillac and the Marquis of Louvois, he began quartering dragoons in Protestant homes. Although this was within his legal rights, the dragonnades inflicted severe financial strain on Protestants and atrocious abuse. Between 300,000 and 400,000 Huguenots converted, as this entailed financial rewards and exemption from the dragonnades . [69]\nOn 15 October 1685, Louis issued the Edict of Fontainebleau, which cited the redundancy of privileges for Protestants given their scarcity after the extensive conversions. The Edict of Fontainebleau revoked the Edict of Nantes and repealed all the privileges that arose therefrom. [4] By his edict, Louis no longer tolerated the existence of Protestant groups, pastors, or churches in France.", - "page_start": 9, - "page_end": 10, - "source_file": "wikipedia5.pdf" - }, - { - "text": "II.8.2. Each party must:\n(a) not use confidential information or documents for any purpose other than to perform its obligations under the FWC or a specific contract without the prior written agreement of the other party;\n(b) ensure the protection of such confidential information or documents with the same level of protection as its own confidential information or documents and in any case with due diligence;\n(c) not disclose, directly or indirectly, confidential information or documents to third parties without the prior written agreement of the other party.\nII.8.3 The confidentiality obligations set out in this Article are binding on the contracting authority and the contractor during the implementation of the FWC and for as long as the information or documents remain confidential unless:\n(a) the disclosing party agrees to release the receiving party from the confidentiality obligation earlier;\n(b) the confidential information or documents become public through other means than a breach of the confidentiality obligation;\n(c) the applicable law requires the disclosure of the confidential information or documents .\nII.8.4 The contractor must obtain from any natural person with the power to represent it or take decisions on its behalf, as well as from third parties involved in the implementation of the FWC a commitment that they will comply with this Article. At the request of the contracting authority, the contractor must provide a document providing evidence of this commitment.", - "page_start": 19, - "page_end": 19, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "What is the prison population grew in average by year between 1993 and 2008 ?", - "target_page": 8, - "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "2. Recent trends in the population\nThe 'Story of the Prison Population 1993 to 2012' is an in-depth look at what happened to the prison population between 1993 and 2012 and the major factors contributing to the changes. 4\nThe prison population grew rapidly between 1993 to 2008, at an average of 4% a year. This rapid rise was driven by:\n increased numbers of people sentenced to immediate custody from 1993 to 2002;\n increases in the average custodial sentence length and increased use of indeterminate sentences; and\n an increase in numbers recalled to prison following breaches of the conditions of licence and these offenders spending longer in prison once recalled.\nThe rise in the prison population slowed considerably from the summer of 2008, in part due to the introduction of the Criminal Justice and Immigration Act (CJIA) 2008 5 which changed sentencing and offender management in ways which helped to reduce growth in the prison population.\nThis flatter trend continued until the public disorder seen in UK cities from 6 to 9 August 2011 which had an immediate but temporary impact on the prison population.\nDuring 2012 and into 2013, the prison population began to fall due to a falling remand population and a continued decline in the number of under 18s in custody. The falling remand population during 2012 reflected falling volumes going through the courts plus the introduction, in December 2012, of measures restricting the use of remand for all offenders who would be unlikely to receive a custodial sentence. 6\nFrom the end of August 2013 to the end of October 2013, the remand\npopulation rose sharply, driving an overall increase in the prison population. This was being driven by an increase in demand in the Crown Courts, especially among more serious tri-able either way cases. The total population has continued to rise since the beginning of 2014 and reached 85,925 7 on the\n4 Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prisonpopulation-1993-2012\n5 services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html\n6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html 7 www.gov.uk/government/statistics/prison-population-figures-2014\n6\nPrison Population Projections 2014 - 2020\n21 November 2014. The latest projections assume demand in the courts remains at this higher level.\nTable 1 summarises these changes.", - "page_start": 7, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Key points\nThis bulletin presents projections of the prison population in England and Wales from November 2014 to December 2020. The prison population projections are based on assumptions about future custodial convictions and incorporate the anticipated impacts of agreed policy and procedural initiatives.\nThe 'Central Scenario' estimates that the prison population will increase from the current position 85,925 1 to 87,700 by June 2015. By the end of June 2020 the prison population is projected to be 90,200. This Central Scenario is our best estimate based on the available information. The projected prison population under our Central Scenario is shown in Chart 1.\nThe prison population projections are produced using a model of flows of offenders into and out of prison which counts the resulting prison population each month.\nChart 1: Projected prison population (Central Scenario)\nThe Central Scenario has been modelled assuming custodial convictions are broadly in line with recent trends and average length of sentence to be flat based on recent trends.\nThe projections do not attempt to estimate the impact of any future Government policy that is yet to achieve Royal Assent, and therefore become less certain over time.\n1 As at 21 November 2014: www.gov.uk/government/statistics/prison-population-figures-2014\n2\nPrison Population Projections 2014 - 2020\nThe assumptions used are based on consultation with policy and operational experts at the Ministry of Justice and the National Offender Management Service. They also take into account observed data trends:\n These projections represent a change from last year where the 2013 Scenario 2 (central) saw the population gradually falling over the six year lifetime of the projection. The Central Scenario in the projections this year shows the population rising over the next six years. This change arises from the fact that the latest projections capture a recent upward trend in prosecutions of more serious offences.\n Despite the fact that overall crime is falling there has been an increase in recorded crime for certain offence types:\no Prosecutions for sexual offences are the highest in the decade and increased by 19% in the 12 months ending June 2014, in line with a 21% increase in recorded crime. Offenders sentenced for sexual offences had an Average Custodial Sentence Length (ASCL) of 59.7 months, a rise of 2.4 months, compared with year ending June 2013.\no Violence against the person proceedings for indictable offences have increased by 7% in the 12 months ending June 2014. This is in line with an 11% increase in recorded crime.", - "page_start": 3, - "page_end": 4, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "4. Results\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\nChart 2 presents Prison population projections from November 2014 to December 2020.\nChart 2: Projected monthly prison population (all scenarios)\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 by the end of June 2015 and then fall to 81,400 by the end of June 2020.\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 by the end of June 2015 and to 98,900 by the end of June 2020.\nThe projected trends reflect the cumulative impacts of the various sentencing, legislative and procedural assumptions that are used to generate the projections. The seasonal pattern reflects the dip in the prison population which is always seen around the Christmas period.\nIn the Central Scenario, the prison population is expected to rise to 90,200 by June 2020. The projected population increase is largely due to the recent trends in case mix where we have seen more serious cases come before the courts. This results in offenders receiving longer custodial sentence lengths, which in turn places an upward pressure on the prison population. The growth in this scenario is largely driven by the rise in the determinate population which is projected to grow to 60,200 by June 2020. This is partially due to the\n11\nPrison Population Projections 2014 - 2020\nintroduction of the Extended Determinate Sentence (EDS) as part of the Legal Aid, Sentencing and Punishment of Offenders 8 (LASPO) Act which commenced in December 2012. Some of the growth in the determinate population has been offset by a decline in the indeterminate population following the removal of the Imprisonment for Public Protection (IPP) sentence in the LASPO act.\nAppendix A contains tables for annual projected end of June populations, average financial year populations and total monthly populations for each scenario along with detailed breakdown of the projections for our subpopulations.\n8 services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html\n12\nPrison Population Projections 2014 - 2020", - "page_start": 12, - "page_end": 14, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Appendix A: Additional tables 9\n11 This population only includes those aged 15-17 in Youth Offending Institutions. 15-18 year olds housed in Secure Children's Homes or Secure Training Centres are not included.\n19\nPrison Population Projections 2014 - 2020\nMonthly tables of overall projected prison population\nTable A14: Monthly values of the overall projected prison population (end of month figures)", - "page_start": 20, - "page_end": 21, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Appendix A: Additional tables 9\nAnnual tables of overall projected prison population\nTable A1: Projected prison population (end of June figures)\nTable A2: Average projected prison population (financial year figures)", - "page_start": 16, - "page_end": 16, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "3a) Producing prison population projections\nPrison population projections are produced using the Prison Population StockFlow Model. The principal sub-populations in prison - determinate sentence, life sentence, imprisonment for public protection (IPP) and remand - are modelled using stock-flow structures based on the generic structure shown in Figure B2. The stock-flow structures model the flow of offenders into and out of prison and count the resulting prison population at the end of each month.\nFigure B2: Generic stock-flow structure in the Prison Population Stock-Flow Model\nFor the determinate population, the monthly inflows to prison are based on the custodial convictions projections described above. These custodial convictions include offenders that may already be serving a sentence for a previous crime or those who would serve their whole custodial sentence on remand, meaning that they would not be a new reception to prison. To convert from custodial convictions to prison receptions we apply a conversion ratio derived from the historical proportions of custodial convictions to prison receptions for each sub-population averaged over the last twelve months of historical data (April 2013 to March 2014 inclusive).\nMonthly outflows for the determinate population are based on observed custodial sentence lengths and the observed percentage of sentence length served taken from October 2013 to April 2014. Each projected offender that enters the model is given a custodial sentence length that is randomly selected from the relevant distribution. These distributions are populated with custodial sentence lengths from actual offender receptions who share the same characteristics of offence, gender and age group in the observed time period. The percent of custodial sentence length served is derived in the same manner, except that the observed distribution is made up of discharged offenders further disaggregated by custodial sentence length band.\nFor offenders who receive the new EDS sentence an adjustment is made to the percent of custodial length served to reflect that these offenders will spend a greater proportion of their sentence in custody than standard determinate sentenced offenders discharged to date.\nProjected prison receptions are sub-divided by age category (Juvenile, Young Adult, Adult) with the exact age of the offender attributed in the same manner as the custodial sentence lengths. This allows the model to explicitly age the offenders whilst in prison (e.g. move from Juvenile to Young Adult categories).\n25\nPrison Population Projections 2014 - 2020\nThe approach for the other sub-populations is similar and has not been substantially revised since the 2013 publication. The methodology applied to each is briefly outlined below.", - "page_start": 26, - "page_end": 27, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "3a) Producing prison population projections\nThe recall population is projected going forward based on time-series data available to October 2014.\nFor remand prisoners the average time served on remand is calculated from the ratio of the remand population to remand receptions. The modelled stock of prisoners is calibrated to historical actuals by varying levels of receptions. The remand population is generated in two parts both using this approach untried remand and unsentenced remand populations being treated separately.\nIPP and life sentence prisoners have an extra section in the stock-flow structure which models the indeterminate nature of their sentence lengths. Outflows for IPP and life sentence prisoners depend on the tariff lengths they receive and on the frequency and outcome of Parole Board hearings. The values of these parameters are set and calibrated to reflect the most recent data on Parole Board outcomes.\nNOMS have made an agreement with the Home Office to hold an increased number of immigration detainees, which are only seen in the final two periods of historical data. The projected size of the non-criminal population is therefore set equal to the average size of the non-criminal population over the last two months of available data. This ensures that the non-criminal projections reflect the latest and most accurate count of the non-criminal population.\nThe population in prison at the end of each modelled month is aggregated into the categories defined by gender, current age group and, for determinate sentence prisoners, sentence length band, to produce raw, unadjusted prison population projections.", - "page_start": 27, - "page_end": 27, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "2. Recent trends in the population\nFurther statistics and commentary on the changes seen in prison population over the last year, is presented in the Offender Management Statistics Quarterly publication. This is available online on GOV.UK at: www.gov.uk/government/collections/offender-management-statistics-quarterly\n7\nPrison Population Projections 2014 - 2020", - "page_start": 8, - "page_end": 9, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Prison Population Projections 2014 - 2020 England and Wales\nMinistry of Justice Statistics Bulletin\nPublished 27th November 2014\nPrison Population Projections 2014 - 2020", - "page_start": 0, - "page_end": 2, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "1. Central Scenario\nThis bulletin presents prison population projections for England and Wales from November 2014 to December 2020. The central projection is produced to aid development, capacity planning and resource allocation within the Criminal Justice System (CJS) and the National Offender Management Service (NOMS). The latest published useable operational capacity (21 November 2014) is 88,015 2 .\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\nThe Central Scenario tracks the impact of current trends in sentencing on custodial convictions, custodial sentence lengths and hence on the resulting prison population. These assumptions have been agreed through a consultative process. Government policy is only included in these projections when it has received Royal Assent. These projections also take into account other drivers including:\n trends in the age, gender and offence of defendants entering the system and in the flow of cases through the courts;\n assumptions regarding future parole hearing frequency and expected outcomes for indeterminate (Life and Indeterminate for the Public Protection) sentences;\n the Home Office gaining access to all 580 places at the Verne Immigration Removal Centre (IRC) by January 2015;\n the impacts of the Offender Rehabilitation Act 2014 3 which achieved Royal Assent on 13 March 2014 meaning offenders sentenced to custodial sentences of less than 12 months will be released subject to licence. There will also be a new post-sentence supervision period following licence for offenders released from custodial sentences of less than 2 years;\n the impacts of the Release on Temporary Licence (ROTL) review deciding that all offenders who have previously absconded will no longer be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances.\n2 www.gov.uk/government/statistics/prison-population-figures-2014\n3 www.justice.gov.uk/transforming-rehabilitation\n4\nPrison Population Projections 2014 - 2020\nTwo illustrative scenarios are produced that consider the impact of; 1) a decrease in custodial convictions and sentence lengths; 2) an increase in custodial convictions and sentence lengths, compared to current trends.\n5\nPrison Population Projections 2014 - 2020", - "page_start": 5, - "page_end": 7, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "Do you know the prison population estimation for the and of June 2020 ?", - "target_page": 13, - "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "4. Results\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\nChart 2 presents Prison population projections from November 2014 to December 2020.\nChart 2: Projected monthly prison population (all scenarios)\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 by the end of June 2015 and then fall to 81,400 by the end of June 2020.\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 by the end of June 2015 and to 98,900 by the end of June 2020.\nThe projected trends reflect the cumulative impacts of the various sentencing, legislative and procedural assumptions that are used to generate the projections. The seasonal pattern reflects the dip in the prison population which is always seen around the Christmas period.\nIn the Central Scenario, the prison population is expected to rise to 90,200 by June 2020. The projected population increase is largely due to the recent trends in case mix where we have seen more serious cases come before the courts. This results in offenders receiving longer custodial sentence lengths, which in turn places an upward pressure on the prison population. The growth in this scenario is largely driven by the rise in the determinate population which is projected to grow to 60,200 by June 2020. This is partially due to the\n11\nPrison Population Projections 2014 - 2020\nintroduction of the Extended Determinate Sentence (EDS) as part of the Legal Aid, Sentencing and Punishment of Offenders 8 (LASPO) Act which commenced in December 2012. Some of the growth in the determinate population has been offset by a decline in the indeterminate population following the removal of the Imprisonment for Public Protection (IPP) sentence in the LASPO act.\nAppendix A contains tables for annual projected end of June populations, average financial year populations and total monthly populations for each scenario along with detailed breakdown of the projections for our subpopulations.\n8 services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html\n12\nPrison Population Projections 2014 - 2020", - "page_start": 12, - "page_end": 14, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Prison Population Projections 2014 - 2020 England and Wales\nMinistry of Justice Statistics Bulletin\nPublished 27th November 2014\nPrison Population Projections 2014 - 2020", - "page_start": 0, - "page_end": 2, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Key points\nThis bulletin presents projections of the prison population in England and Wales from November 2014 to December 2020. The prison population projections are based on assumptions about future custodial convictions and incorporate the anticipated impacts of agreed policy and procedural initiatives.\nThe 'Central Scenario' estimates that the prison population will increase from the current position 85,925 1 to 87,700 by June 2015. By the end of June 2020 the prison population is projected to be 90,200. This Central Scenario is our best estimate based on the available information. The projected prison population under our Central Scenario is shown in Chart 1.\nThe prison population projections are produced using a model of flows of offenders into and out of prison which counts the resulting prison population each month.\nChart 1: Projected prison population (Central Scenario)\nThe Central Scenario has been modelled assuming custodial convictions are broadly in line with recent trends and average length of sentence to be flat based on recent trends.\nThe projections do not attempt to estimate the impact of any future Government policy that is yet to achieve Royal Assent, and therefore become less certain over time.\n1 As at 21 November 2014: www.gov.uk/government/statistics/prison-population-figures-2014\n2\nPrison Population Projections 2014 - 2020\nThe assumptions used are based on consultation with policy and operational experts at the Ministry of Justice and the National Offender Management Service. They also take into account observed data trends:\n These projections represent a change from last year where the 2013 Scenario 2 (central) saw the population gradually falling over the six year lifetime of the projection. The Central Scenario in the projections this year shows the population rising over the next six years. This change arises from the fact that the latest projections capture a recent upward trend in prosecutions of more serious offences.\n Despite the fact that overall crime is falling there has been an increase in recorded crime for certain offence types:\no Prosecutions for sexual offences are the highest in the decade and increased by 19% in the 12 months ending June 2014, in line with a 21% increase in recorded crime. Offenders sentenced for sexual offences had an Average Custodial Sentence Length (ASCL) of 59.7 months, a rise of 2.4 months, compared with year ending June 2013.\no Violence against the person proceedings for indictable offences have increased by 7% in the 12 months ending June 2014. This is in line with an 11% increase in recorded crime.", - "page_start": 3, - "page_end": 4, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "2. Recent trends in the population\nFurther statistics and commentary on the changes seen in prison population over the last year, is presented in the Offender Management Statistics Quarterly publication. This is available online on GOV.UK at: www.gov.uk/government/collections/offender-management-statistics-quarterly\n7\nPrison Population Projections 2014 - 2020", - "page_start": 8, - "page_end": 9, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Appendix A: Additional tables 9\nPrison Population Projections 2014 - 2020", - "page_start": 22, - "page_end": 22, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "2. Recent trends in the population\nThe 'Story of the Prison Population 1993 to 2012' is an in-depth look at what happened to the prison population between 1993 and 2012 and the major factors contributing to the changes. 4\nThe prison population grew rapidly between 1993 to 2008, at an average of 4% a year. This rapid rise was driven by:\n increased numbers of people sentenced to immediate custody from 1993 to 2002;\n increases in the average custodial sentence length and increased use of indeterminate sentences; and\n an increase in numbers recalled to prison following breaches of the conditions of licence and these offenders spending longer in prison once recalled.\nThe rise in the prison population slowed considerably from the summer of 2008, in part due to the introduction of the Criminal Justice and Immigration Act (CJIA) 2008 5 which changed sentencing and offender management in ways which helped to reduce growth in the prison population.\nThis flatter trend continued until the public disorder seen in UK cities from 6 to 9 August 2011 which had an immediate but temporary impact on the prison population.\nDuring 2012 and into 2013, the prison population began to fall due to a falling remand population and a continued decline in the number of under 18s in custody. The falling remand population during 2012 reflected falling volumes going through the courts plus the introduction, in December 2012, of measures restricting the use of remand for all offenders who would be unlikely to receive a custodial sentence. 6\nFrom the end of August 2013 to the end of October 2013, the remand\npopulation rose sharply, driving an overall increase in the prison population. This was being driven by an increase in demand in the Crown Courts, especially among more serious tri-able either way cases. The total population has continued to rise since the beginning of 2014 and reached 85,925 7 on the\n4 Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prisonpopulation-1993-2012\n5 services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html\n6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html 7 www.gov.uk/government/statistics/prison-population-figures-2014\n6\nPrison Population Projections 2014 - 2020\n21 November 2014. The latest projections assume demand in the courts remains at this higher level.\nTable 1 summarises these changes.", - "page_start": 7, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Appendix A: Additional tables 9\n11 This population only includes those aged 15-17 in Youth Offending Institutions. 15-18 year olds housed in Secure Children's Homes or Secure Training Centres are not included.\n19\nPrison Population Projections 2014 - 2020\nMonthly tables of overall projected prison population\nTable A14: Monthly values of the overall projected prison population (end of month figures)", - "page_start": 20, - "page_end": 21, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "1. Central Scenario\nThis bulletin presents prison population projections for England and Wales from November 2014 to December 2020. The central projection is produced to aid development, capacity planning and resource allocation within the Criminal Justice System (CJS) and the National Offender Management Service (NOMS). The latest published useable operational capacity (21 November 2014) is 88,015 2 .\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\nThe Central Scenario tracks the impact of current trends in sentencing on custodial convictions, custodial sentence lengths and hence on the resulting prison population. These assumptions have been agreed through a consultative process. Government policy is only included in these projections when it has received Royal Assent. These projections also take into account other drivers including:\n trends in the age, gender and offence of defendants entering the system and in the flow of cases through the courts;\n assumptions regarding future parole hearing frequency and expected outcomes for indeterminate (Life and Indeterminate for the Public Protection) sentences;\n the Home Office gaining access to all 580 places at the Verne Immigration Removal Centre (IRC) by January 2015;\n the impacts of the Offender Rehabilitation Act 2014 3 which achieved Royal Assent on 13 March 2014 meaning offenders sentenced to custodial sentences of less than 12 months will be released subject to licence. There will also be a new post-sentence supervision period following licence for offenders released from custodial sentences of less than 2 years;\n the impacts of the Release on Temporary Licence (ROTL) review deciding that all offenders who have previously absconded will no longer be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances.\n2 www.gov.uk/government/statistics/prison-population-figures-2014\n3 www.justice.gov.uk/transforming-rehabilitation\n4\nPrison Population Projections 2014 - 2020\nTwo illustrative scenarios are produced that consider the impact of; 1) a decrease in custodial convictions and sentence lengths; 2) an increase in custodial convictions and sentence lengths, compared to current trends.\n5\nPrison Population Projections 2014 - 2020", - "page_start": 5, - "page_end": 7, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "3. Modelling methodology and projection scenarios\nThe prison projections model is part of wider work within the Ministry of Justice to develop a consistent and coherent suite of models of the criminal courts and offender management, driven by common projections of demand for the Ministry of Justice's services.\nThe custodial convictions model uses projections of numbers of defendants entering the criminal courts. In order to project volumes of defendants being given a custodial sentence, it also takes into account:\n the age, gender and offence of defendants entering the system;\n the flow of cases through the courts; and\n the sentences which concluded cases attract.\nThe prison population projections model takes projections of custodial convictions, converts them to projections of prison receptions and then models the amount of time that offenders spend in prison to calculate the resulting prison population.\nThe benefits of this method are that it allows us to:\n explicitly project custodial convictions (rather than just convictions);\n understand the Criminal Justice System factors which contribute to change in the prison population, such as time served, sentences given, trial and sentencing court changes or shifts in defendant demographics; and\n more easily model the impact on the prison population of specific Ministry of Justice and other Criminal Justice Agency policy changes relating to specific offences or specific sentences.\nAppendix B provides details of the methods used to produce the prison population projections and the assumptions behind them.\nThe assumptions informing these projections, and therefore the projections themselves, are subject to significant uncertainty. This is represented by the three scenarios, with each scenario being only as likely as the assumptions which inform it.\nThe method used for generating projections of the prison population in England and Wales for the 2014-2020 projections is consistent with the approach used to generate the 2013-2019 projections published on 7 November 2013.\n8\nPrison Population Projections 2014 - 2020\nAt the core of the method is a model of flows of offenders into and out of prison which counts the resulting prison population each month for sentenced, recall and remand prisoners.\nInputs to the prison projections model include projections of future custodial convictions. These are generated from time series projections of numbers of defendants entering the criminal courts and take into account the age, gender and offence of defendants entering the system, the flow of cases through the courts and the sentences which concluded cases attract.", - "page_start": 9, - "page_end": 10, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Appendix A: Additional tables 9\nAnnual tables of overall projected prison population\nTable A1: Projected prison population (end of June figures)\nTable A2: Average projected prison population (financial year figures)", - "page_start": 16, - "page_end": 16, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "What is the phone number of the Ministry of Justice press office ?", - "target_page": 30, - "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Contact Points for further information\nCurrent and previous editions of this publication are available for download from www.justice.gov.uk/publications/statistics-and-data/index.htm\nPress enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536\nOther enquiries about these statistics should be directed to:\nJustice Statistics Analytical Services Ministry of Justice 7th Floor 102 Petty France London SW1H 9AJ\nGeneral enquiries about the statistical work of the Ministry of Justice can be emailed to: statistics.enquiries@justice.gsi.gov.uk\nGeneral information about the official statistics system of the UK is available from www.statistics.gov.uk\n28\nPrison Population Projections 2014 - 2020\nAlternative format versions of this report are available on request from the Ministry of Justice at statistics.enquiries@justice.gsi.gov.uk\n© Crown copyright Produced by the Ministry of Justice\n29", - "page_start": 29, - "page_end": 30, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Up button:\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to reactivate the watch.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "EXPLANATORY NOTE\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n6\n£6.90\nUK202004291001 05/2020 19585\nhttp://www.legislation.gov.uk/id/uksi/2020/471", - "page_start": 5, - "page_end": 7, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Prison Population Projections 2014 - 2020 England and Wales\nMinistry of Justice Statistics Bulletin\nPublished 27th November 2014\nPrison Population Projections 2014 - 2020", - "page_start": 0, - "page_end": 2, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Extending Office PDF Export\nExtending Office PDF Export", - "page_start": 0, - "page_end": 0, - "source_file": "office-pdf.pdf" - }, - { - "text": "OFFICE FURNITURE AT-A-GLANCE\nMaxon Furniture Inc. targets small to midsized businesses seeking 'planned' offices featuring workstations and compatible storage and seating. Maxon's customers appreciate office furniture that efficiently organizes space and creates a positive working environment.", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Bernard Rey\nSenior Vice President CEO/COO Office Global Motorsports Alliance Coordination Office Security Office Legal Dept. Organization Development and Process Re-engineering\nSecretariat", - "page_start": 110, - "page_end": 110, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "I NVESTOR RELATIONS\nSend inquiries to:\nInvestor Relations\nHON INDUSTRIES Inc.\n414 East Third Street\nMuscatine, IA 52761\nTelephone: 563.264.7400\nFax: 563.264.7655\nE-mail: investorrelations@honi.com", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Office 2024\nOffice 2024 PDF Accessibility Improvements", - "page_start": 0, - "page_end": 0, - "source_file": "office-pdf.pdf" - }, - { - "text": "25 Terrie L. Tweddle\nVice President, Corporate Communications", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "What is SOLR ?", - "target_page": 4, - "target_passage": "Search engine used for portal content search and dataset search ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "3.7.4 SPARQL Queries\nThe third tab displays all queries set to 'public'. Upon creat ing or modifying a query the user may set the attribute 'public', which will mak e the query accessible to everyone.\nOnce the user is logged-in, another list with all private queries including the owned public queries will be displayed. Besides 'Query name ' and 'Query comment ', the attribute 'Enabled' visualizes if the query is currently running on a recurring time interval.\nAll attributes may be changed upon se lecting 'Details' if the logg ed-in user is the owner of selected query.\nEuropean Data Portal Version 4.3 -User Manual\nPage 57 of 57", - "page_start": 56, - "page_end": 56, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Chapter 9 Queries: Description Logic and SPARQL\nNow that we have some individuals in our ontology, we can do some interesting queries. There are several tools for doing queries in Protégé.", - "page_start": 66, - "page_end": 66, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Other sources\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge discovery\". The Knowledge Engineering Review . 20 (1): 39-61. doi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). S2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656).\nMcGaughey, E (2022), Will Robots Automate Your Job Away? Full Employment, Basic Income, and Economic Democracy (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), p. 51(3) Industrial Law Journal 511-559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), archived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper s.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023\nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, Graham (eds.). Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques . Springer Science & Business Media. ISBN 978-1-4614-6940-7.\nMinsky, Marvin (1967), Computation: Finite and Infinite Machines , Englewood Cliffs, N.J.: Prentice-Hall", - "page_start": 60, - "page_end": 60, - "source_file": "wikipedia3.pdf" - }, - { - "text": "9.2 SPARQL Queries\nSPARQL is a powerful language, and one could write a whole book about it. In fact, there are books written about it. The best one I have seen is the O'Reilly book Learning SPARQL by Bob DuCharme. This is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how triples are used to represent all information in OWL. I will only touch on those issues here, there is much more to say about them and DuCharme's book is a great place to learn more. If some of the following is a bit hard to understand don't be discouraged. This is just an attempt to give a very high level introduction to something that requires significant study to really understand.\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. Just as SQL can do more than just query, it can also assert new information into a database, so SPARQL can as well. The current SPARQL plugins for Protégé are somewhat limited and don't support the statements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a query language but keep in mind there is a lot more to it than what we briefly cover here.", - "page_start": 67, - "page_end": 67, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.2.3 How to store personal queries\nAs a logged-in user it is possible to store queries. This includes the search term and selected facets. The option is available by clicking on 'Save Query' on the datasets view.\nThe user has to enter a title and description for the query. After submitting the form by clicking on 'Save Query' the current state of the search query will stored.\nA list of all stored queries can be found in the user's dashboard: Data > Dashboard > M y Queries. Each user can only access their own queries. It is possible to search, sort and delete the queries. By clicking on the title of the query the respective search is executed.\nEuropean Data Portal Version 4.3 -User Manual\nPage 29 of 57\nEuropean Data Portal Version 4.3 -User Manual\nPage 30 of 57", - "page_start": 28, - "page_end": 29, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.7 SPARQL Manager\nThe SPARQL Manager provides a graphical user interface (GUI) for sending user defined queries to the Virtuoso SPARQL query engine.\nThe powerful SPARQL Protocol and RDF Query Language are primarily aimed at professionals for querying metadata as Linked Data. A basic knowledge of the DCAT-AP specification is highly recommended.\nIn the future, users of the SPARQL Manager will be able to save their queries for scheduled execution. Additionally a notification will be send to the user when a result has changed.\nClicking the info icon in the upper right corner will display a step-by-step walkthrough of all components with a short info about their function.\nThis is possible in both of modes of the SPARQL Manager, the search and the assistant mode, which will be described in the following sections.", - "page_start": 53, - "page_end": 53, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "# oc new-app \\\n-e MONGODB_USER=admin \\\n-e MONGODB_PASSWORD=secret \\\n-e MONGODB_DATABASE=mongo_db\\\n-e MONGODB_ADMIN_PASSWORD=super-secret \\\nregistry.access.redhat.com/rhscl/mongodb-36-rhel7\n--> Found Docker image 3414ee2 (4 weeks old) from registry.access.redhat.com for \"registry.access.redhat.com/rhscl/mongodb-36-rhel7\"\nMongoDB 3.6\n-----------\nMongoDB (from humongous) is a free and open-source cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with schemas. This container image contains programs to run mongod server.\nTags: database, mongodb, rh-mongodb36\n* An image stream tag will be created as \"mongodb-36-rhel7:latest\" that will track this image\n* This image will be deployed in deployment config \"mongodb-36-rhel7\"\n* Port 27017/tcp will be load balanced by service \"mongodb-36-rhel7\"\n* Other containers can access this service through the hostname \"mongodb-36-rhel7\"\n* This image declares volumes and will default to use non-persistent, host-local storage.\nYou can add persistent volumes later by running 'volume dc/mongodb-36-rhel7 --add\n...'\n--> Creating resources ... imagestream.image.openshift.io \"mongodb-36-rhel7\" created\ndeploymentconfig.apps.openshift.io \"mongodb-36-rhel7\" created service \"mongodb-36-rhel7\" created", - "page_start": 181, - "page_end": 182, - "source_file": "sg248459.pdf" - }, - { - "text": "Aggregated logging\nOne of the Red Hat OpenShift Container Platform optional components is named Red Hat OpenShift Container Platform aggregated logging. This component collects and aggregates logs from the pods that are running in the Red Hat OpenShift Container Platform cluster and /var/log/messages on nodes. This configuration enables Red Hat OpenShift Container Platform users to view the logs of projects that they can view by using a web interface.\nRed Hat OpenShift Container Platform aggregated logging component is a modified version of the ELK stack, which is composed of a few pods that are running on the Red Hat OpenShift Container Platform environment:\n/SM590000 Elasticsearch: An object store where all logs are stored.\n/SM590000 Kibana: A web UI for Elasticsearch.\n/SM590000 Curator: Elasticsearch maintenance operations that are performed automatically on a per-project basis.\n/SM590000 Fluentd: Gathers logs from nodes and containers and feeds them to Elasticsearch.\nConsider the following basic concepts for aggregated logging:\n/SM590000 Cluster: A set of Elasticsearch nodes that distribute the workload.\n/SM590000 Node: A container that is running an instance of Elasticsearch, which is part of the cluster.\n/SM590000 Index: Collection of documents (container logs).\n/SM590000 Shards and Replicas: Indexes can be divided into sets of data that contain the primary copy of the documents that are stored (primary shards) or backups of that primary copies (replica shards). Sharding allows the application to horizontally scale the information and distributed/paralellized operations. Replication instead provides HA and also better search throughput because searches are also run on replicas.\nNote: Using NFS storage as a volume or a persistent volume (or by way of an NAS such as Gluster) is not supported for Elasticsearch storage because Lucene relies on file system behavior that NFS does not supply. Data corruption and other problems can occur.", - "page_start": 112, - "page_end": 112, - "source_file": "sg248459.pdf" - }, - { - "text": "3.7.2 SPARQL Assistant\nThe SPARQL assistant extends the functionality of the simple SPARQL search described in the previous section. More complex queries for datasets could be built by clicking several options in the GUI.", - "page_start": 54, - "page_end": 54, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Permissively licensed works\nSee e.g. Heald, Paul J. 'How Copyright Makes Books and Music Disappear (and How Secondary 16 Liability Rules Help Resurrect Old Songs).' Illinois Program in Law, Behavior and Social Science Paper No. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. Accessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, Rebecca J. 'Why Are so Few Books from the 20th Century Available as Ebooks?' The Atlantic , 18 Mar. 2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-centuryavailable-as-ebooks/284486/. See also 'Google Book Search Settlement and Access to Out of Print Books.' Google Public Policy Blog , publicpolicy.googleblog.com/2009/06/google-book-searchsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed classaction settlement between Google, the Authors Guild, and the Association of American Publishers). Google's final brief in the settlement proceedings notes the 'prohibitive transaction costs of identifying and locating individual Rightsholders of these largely older, out-of-print books' - see this brief at https:// web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ google_final_approval_support.pdf. The Authors Guild and Association of American Publishers also justified the settlement's terms in light of the fact that 'the transaction costs involved in finding copyright owners and clearing the rights are too high'; while they argued that most works are not truly 'orphans,' they note that total transaction costs as a whole (including, for example, determining whether the author or publisher holds the rights and then negotiating rates) are so high as to block uses of outof-print works anyway - see this brief at https://web.archive.org/web/20130112060213/http://", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "What is the function of the Graphical Data Visualisation Tool module ?", - "target_page": 6, - "target_passage": "How to visualize graphical data from a dataset resource ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The table 1-3 below lists the described functions by module.\n1, Module Name = Portal HomePage. 1, Function = (how to access Resources on Open Data: eLearning modules, Training Companion, Reports about Open Data) - How to vi ew / search for 'Latest News' - How to view / search for 'Open Data Events' - How to subscribe to the EDP Newsletter - How to view 'Tweets' on the EDP - How to switch to another User Language. 2, Module Name = Datasets (Data Platform). 2, Function = - How to search for Datasets by Keyword Entering the Datasets-View. , Module Name = . , Function = How to filter datasets by using 'Faceted Search'. , Module Name = . , Function = How to store personal queries. , Module Name = . , Function = How to download dataset distributions. , Module Name = . , Function = How to view licensing information How to switch to another user language. , Module Name = . , Function = How to browse by data catalogues. 3, Module Name = Visualization of Geo-Spatial Data (map.apps). 3, Function = How to visualize geo-spatial data from a dataset resource. 4, Module Name = Graphical Data Visualisation Tool. 4, Function = How to visualize graphical data from a dataset resource. 5, Module Name = Help Desk. 5, Function = How to contact The Portal's Help Desk. 6, Module Name = Metadata Quality Assurance (MQA). 6, Function = Monitoring tool for the metadata quality: - The Global Dashboard View - The Catalogue details view. 7, Module Name = SPARQL Manager. 7, Function = How to run SPARQL Queries using: - SPARQL Search\nEuropean Data Portal Version 4.3 -User Manual\nPage 6 of 57\nTable 1-3: Main functions of the Portal Version 3.0", - "page_start": 5, - "page_end": 6, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.4 Graphical Data Visualisation Tool\nThis section describes the features of the graphical visualisation tool for numeric data. The features are currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which is applicable only for Excel files.\nMost GUI elements from th e 'Graph' tab (records selection, search box, filters and fields buttons) are al so available on the 'Grid' tab and work in the same way.", - "page_start": 42, - "page_end": 42, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.3.1 How to visualize geo-spatial data from a dataset resource\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for specific data, enters the dataset view of reasonable results and displays the available distributions (see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe button is displayed (see Figure 3). This is the entry point into the map viewer application. Supported formats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial visualization for the first time, an interactive user tutorial is provided to guide the use through specific functions of the user interface, similar to this written user manual.\nFigure 3 -Dataset Resource Page with Link to Geo-Spatial Visualisation.\nEuropean Data Portal Version 4.3 -User Manual\nPage 38 of 57\nOnce within the map viewer application, the user can decide which layers to be displayed. Most Web Map Service (WMS) instances provide more than one layer. The geo-spatial visualization provides a dialog for choosing the desired layers for display (see Figure 4).\nFigure 4 -Selection of layers.\nIn order to examine the resource in more detail, the user can click on a geographic feature while the 'Feature Info' tool is enabled (see Figure 5). This function is only enabled if the service supports this kind of detailed query.\nEuropean Data Portal Version 4.3 -User Manual\nPage 39 of 57\nFigure 5 -Feature Info tool.\nThe different disp layed layers can be examined using the 'Legend' tool. If the external service provides legend graphics, the user can interpret the given symbology and temporarily disable the display of layers (see Figure 6).\nFigure 6 -Legend tool.\nEuropean Data Portal Version 4.3 -User Manual\nPage 40 of 57\nThe two buttons on the bottom right of the map viewer (see Figure 7) can be used to display an informational disclaimer and to start the user interface tutorial.\nFigure 7 -Disclaimer and tutorial buttons.\nIn some cases the user might experience the display of an error message. The geo-spatial visualization tries to support all flavors of external services but cannot guarantee to work with broken services. In these situations an error message dialog is presented and the user can decide if a support ticket shall be opened (see Figure 8).\nEuropean Data Portal Version 4.3 -User Manual", - "page_start": 37, - "page_end": 40, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.4.1 How to visualize graphical data from a dataset resource\nAs a result of a dataset search, the system displays on th e 'Dataset' tab all distributions (resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset can be further explored by clicking on ' Open Visualization ' under the ' Options ' button -if available.\nEuropean Data Portal Version 4.3 -User Manual\nPage 43 of 57\nAfter clicking on the ' Open Visualization ' button, the user should execute the following steps:", - "page_start": 42, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "1.3 Terminology\nAPI, Description = Application Programmer Interface. CKAN, Description = (replaced by the ' Data Platform ' ). CSV, Description = Comma separated values. Data Platform, Description = Single page web app for managing and displaying datasets. DCAT-AP, Description = DCAT Application Profile - Metadata specification based on the Data Catalogue vocabulary (DCAT). DRUPAL, Description = Content Management System. ECAS / EU-Login, Description = EU user login page. EDP, Description = European Data Portal. FME, Description = Feature Manipulation Engine. GUI, Description = Graphical User Interface. HTTP, Description = Hypertext Transfer Protocol. JSON, Description = JavaScript Object Notation (a lightweight data-interchange format). maps.app, Description = Geo-spatial data visualization application. MQA, Description = Metadata Quality Assistant. RDF, Description = Resource Description Framework. SOLR, Description = Search engine used for portal content search and dataset search\nEuropean Data Portal Version 4.3 -User Manual\nPage 4 of 57\nTable 1-2: Abbreviations and Acronyms", - "page_start": 3, - "page_end": 4, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "10.1.3 Monitoring Easy Tier activity\nWhen Easy Tier is active, it constantly monitors and records I/O activity, collecting extent heat data. Heat data files are produced approximately once a day and summarize the activity per volume since the last heat data file was produced.\nThe IBM Storage Tier Advisor Tool (STAT) is a Windows console application that can analyze heat data files that are produced by Easy Tier and produce a graphical display of the amount of 'hot' data per volume and predictions of how more Solid-State Drive (T0) capacity, Enterprise Drive (T1), and Nearline Drive (T2) might benefit performance for the system and by storage pool.\nChapter 10. Advanced features for storage efficiency\n413\n414\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nIBM STAT can be downloaded from this IBM Support web page.\nYou can download the Storage Tier Advisor Tool and install it on your Windows-based computer. The tool is packaged as an ISO file that must be extracted to a temporary location.\nThe tool installer is at temporary_location\\IMAGES\\STAT\\Disk1\\InstData\\NoVM\\ . By default, the Storage Tier Advisor Tool is installed in C:\\Program Files\\IBM\\STAT\\ .\nOn IBM Storwize V7000, the heat data files are found in the /dumps/easytier directory on the configuration node and are named dpa_heat.node_panel_name.time_stamp.data . Any heat data file is erased when it exists for longer than 7 days.\nHeat files must be offloaded and Storage Tier Advisor Tool started from a Windows command prompt console with the file specified as a parameter, as shown in Example 10-6.\nExample 10-6 Running STAT in Windows command prompt\nC:\\Program Files (x86)\\IBM\\STAT>stat dpa_heat.7822DFF-1.181028.073824.data\nThe Storage Tier Advisor Tool creates a set of .html and .csv files that can be used for Easy Tier analysis.\nTo download a heat data file, open Settings → Support → Support Package → Download Support Package → Download Existing Package , as shown in Figure 10-8.\nFigure 10-8 Download Easy Tier heat file: Download Support Package", - "page_start": 434, - "page_end": 435, - "source_file": "sg247938.pdf" - }, - { - "text": "10.1.3 Monitoring Easy Tier activity\nA download window opens that shows all of the files in /dumps and its subfolders on a configuration node. You can filter the list by using the 'easytier' keyword, select the dpa_heat file or files that are analyzed, and clicking Download , as shown in Figure 10-9. Save them in a convenient location (for example, to a subfolder that holds the STAT executable).\nFigure 10-9 Downloading Easy Tier heat data file: dpa_heat files\nYou can also specify the output directory. STAT creates a set of HTML files, and the user can then open the index.html file in a browser to view the results. Also, the following CSV files are created and placed in the Data_files directory:\n/SM590000 _data_movement.csv\n/SM590000 _skew_curve.csv\n/SM590000 _workload_ctg.csv\nThese files can be used as input data for other utilities.\nFor more information about how to interpret STAT tool output and CSV files analysis, see IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and Performance Guidelines , SG24-7521.", - "page_start": 436, - "page_end": 436, - "source_file": "sg247938.pdf" - }, - { - "text": "Real-time performance statistics monitoring with the GUI\nThe IBM Spectrum Virtualize dashboard gives you performance at a glance by displaying some information about the system. You can see the entire cluster (the system) performance by selecting the information between Bandwidth, Response Time, IOps, or CPU utilization.\nYou can also display a Node Comparison by selecting the same information as for the cluster, and then switching the button, as shown in Figure A-1 and Figure A-2.\nFigure A-1 IBM Spectrum Virtualize Dashboard displaying System performance overview\nFigure A-2 shows the display after switching the button.\nFigure A-2 IBM Spectrum Virtualize Dashboard displaying Nodes performance overview\nYou can also use real-time statistics to monitor CPU utilization, volume, interface, and MDisk bandwidth of your system and nodes. Each graph represents 5 minutes of collected statistics and provides a means of assessing the overall performance of your system.\nThe real-time statistics are available from the IBM Spectrum Virtualize GUI. Click Monitoring → Performance (as shown in Figure A-3) to open the Performance Monitoring window.\nFigure A-3 Selecting performance pane in the monitoring menu\nAppendix A. Performance data and statistics gathering\n749\n750\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nAs shown in Figure A-4 on page 751, the Performance monitoring pane is divided into the following sections that provide utilization views for the following resources:\n/SM590000 CPU Utilization: The CPU utilization graph shows the current percentage of CPU usage and peaks in utilization. It can also display compression CPU usage for systems with compressed volumes.\n/SM590000 Volumes: Shows four metrics on the overall volume utilization graphics:\n- Read\n- Write\n- Read latency\n- Write latency\n/SM590000 Interfaces: The Interfaces graph displays data points for FC, iSCSI, serial-attached SCSI (SAS), and IP Remote Copy interfaces. You can use this information to help determine connectivity issues that might affect performance:\n- Fibre Channel\n- iSCSI\n- SAS\n- IP Remote Copy\n/SM590000 MDisks: Also shows four metrics on the overall MDisks graphics:\n- Read\n- Write\n- Read latency\n- Write latency\nYou can use these metrics to help determine the overall performance health of the volumes and MDisks on your system. Consistent unexpected results can indicate errors in configuration, system faults, or connectivity issues.", - "page_start": 769, - "page_end": 771, - "source_file": "sg247938.pdf" - }, - { - "text": "Graphical indexer example\nBy using the graphical indexer, you can define triggers, fields, and indexes for PDF reports within the application component of Content Manager OnDemand in a similar way to defining them for line data. This section serves as an introduction to the PDF graphical indexer by stepping through an example of indexing a PDF document.\nThe example describes how to use the graphical indexer from the report wizard to create indexing information for an input file. The indexing information consists of a trigger that uniquely identifies the beginning of a document in the input file and the fields and indexes for each document. We elaborate on this example by clarifying several of the instructions, and throughout each step, we add important hints, tips, and explanations.\nThe process consists of these steps:\n1. Start the Administrator Client and log on to a server.\n2. Start the report wizard. Click the report wizard icon on the toolbar.\n3. In the Sample Data window, select PDF from the drop-down list of data types, and then click Select Sample Data .\n4. In the Open window, enter the name or full path name of your file in the space that is provided or use the Browse option to locate your PDF file.\n5. Click Open . The graphical indexer opens the input file in the report window.\nIf the PDF data fails to display, or an error message, such as the message that is shown in Figure 7-2, is displayed, you must follow the steps in 'Installation' on page 169 to verify that the API file is in the correct Acrobat plug-in directory.\nFigure 7-2 Error message if PDF does not display\nChapter 7. Indexing and loading\n169\n170\nIBM Content Manager OnDemand Guide\n6. Press F1 to open the main help topic for the report window.\nThe main help topic contains general information about the report window and links to other topics that describe how to add triggers, fields, and indexes. For example, to get help to define a trigger, click Adding a trigger (PDF) . You can also use the context help tool to display information about the icons on the toolbar.\n7. Close any open help topics and return to the report window.\n8. To define a trigger, complete the following steps:\na. Find a text string that uniquely identifies the beginning of a document, for example, Account Number, Invoice Number, Customer Name .", - "page_start": 192, - "page_end": 193, - "source_file": "sg246915.pdf" - }, - { - "text": "10.6.2 Evaluating compression and deduplication\nTo help with the profiling and analysis of user workloads that must be migrated to the new system, IBM provides a highly accurate data reduction estimation tool that supports both deduplication and compression. The tool operates by scanning target workloads on any legacy array (from IBM or third party) and then merging all scan results to provide an integrated system level data reduction estimate.\nThe Data Reduction Estimator Tool (DRET) utility uses advanced mathematical and statistical algorithms to perform an analysis with low memory footprint. The utility runs on a host that can access the devices to be analyzed. It performs only read operations so it has no effect on the data stored on the device.\nThe following sections provide information about installing DRET on a host and using it to analyze devices on it. Depending on the environment configuration, in many cases DRET is used on more than one host to analyze more data types.\nWhen DRET is used to analyze a block device that is used by a file system, all underlying data in the device is analyzed, regardless of whether this data belongs to files that were deleted from the file system. For example, you can fill a 100 GB file system and make it 100% used, and then, delete all the files in the file system to make it 0% used. When scanning the block device that is used for storing the file system in this example, the DRET accesses the data that belongs to the files that are deleted.\nImportant: The preferred method of using DRET is to analyze volumes that contain as much active data as possible rather than volumes that are mostly empty of data. This increases the accuracy level and reduces the risk of analyzing old data that is deleted, but might still have traces on the device.\nFor more information and the latest version of this utility, see this IBM Support web page.", - "page_start": 452, - "page_end": 452, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "How to view “Tweets” on the EDP ?", - "target_page": 20, - "target_passage": "The Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the right hand side. ‐ ‐ Click on any of the tweets to display the complete tweet on twitter. Scroll vertically to see previous tweets. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3.1.5 How to view 'Tweets' on the EDP\nThe Home Page displays the latest tweets on the European Data Portal in the 'Tweets' pa nel on the right hand side.\n-Click on any of the tweets to display the complete tweet on twitter.\n-Scroll vertically to see previous tweets.\nEuropean Data Portal Version 4.3 -User Manual\nPage 20 of 57", - "page_start": 19, - "page_end": 19, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.2. Data\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to select hashtags, language, start date, and end date as inputs. Once the first request was completed, the server responded with a file in json format and the first 20 qualified tweets in a time-descending order. By parsing the json file, we obtained a string for the crawler to build the next request and obtain the next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler was automatically terminated when all the qualified tweets publicly available were collected. Our crawler respected Twitter's robot.txt and we did not collect, analyze or display any user information in our study. To collect these tweets, we used a Python-based crawler to send requests to the Twitter server to select hashtags, language, start date, and end date as inputs. Once the first request was completed, the server responded with a file in json format and the first 20 qualified tweets in a time-descending order. By parsing the json file, we obtained a string for the crawler to build the next request and obtain the next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler was automatically terminated when all the qualified tweets publicly available were collected. Our crawler respected Twitter's robot.txt and we did not collect, analyze or display any user information in our study.\nFigure 1. The number of tweets containing #climatechange or #globalwarming, and their ratio from 2009 to 2018 ( a ). The number of hashtags contained in the 'climate change' or 'global warming' datasets, and their ratio from 2009 to 2018 ( b ). Figure 1. The number of tweets containing #climatechange or #globalwarming, and their ratio from 2009 to 2018 ( a ). The number of hashtags contained in the 'climate change' or 'global warming' datasets, and their ratio from 2009 to 2018 ( b ).\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n6 of 22", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed10.pdf" - }, - { - "text": "3.2. Data\nAll the hashtags in the tweets were automatically extracted with the Regular Expression Library in Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed (e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the 'climate change' dataset contained the #climatechange hashtag and all the tweets in the 'global warming' dataset contained the #globalwarming hashtag, we did not document these two hashtags when processing data. The number of hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose frequency was lower than ten times are excluded in the network analysis. As hashtags are intended to be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, and excluding them helps researchers focus on meaningful rather than occasional associations.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" - }, - { - "text": "2.3. Hashtags as Frame Vehicles on Social Media\nWhen hashtags are used in combination with each other, their co-occurrence pattern in big data can hint to the cognitive associations in people's thoughts [60,68]. Researchers can extract nonlinear social media narratives [69] and discover the networked frame crowdsourced by the public [61]. In the field of climate communication, co-occurrence of environment and social-political hashtags is thought to strengthen the associations between a variety of trans-regional issues in protests and build collective action frames [70]. The role of climate change issues in the Australian federal election was also discovered with a co-hash analysis [71]. Reference [72] examined how hashtags concerning science, political campaigns, geographical discussions, societal concerns, and new technologies co-occurred with 'IPCC', o GLYPH<11> ering a broad context for studying IPCC communication on social media.\nThere are many other words in tweets besides hashtags to express the author's intention. Multiple approaches, such as LDA and STM [32,73], can help to extract topics from unstructured texts. But in this study, targeting on hashtags is more in line with our research question. Firstly, hashtags were invented spontaneously by users of Twitter in 2007 as a mechanism to categorize discussions [74]. Words with hashtags are recognized as topics and considered worthy of public discussion. Secondly, by attaching # to certain words in tweets, the users intentionally anchor their tweets to certain topics. The operator # explicitly reflects the author's emphasis, which can help us extract rather than infer the author's identification of the topic of the tweets. Our research question is to analyze and visualize the associations of topics in public climate discourse. Compared with other approaches, analyzing hashtags co-occurrence pattern has advantage in extracting the structure of public discussions.\nInt. J. Environ. Res. Public Health\n2020\n,\nxx\n, 5\n5 of 22\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n5 of 22\n3. Methods", - "page_start": 3, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "3.2. Data\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, as these two hashtags exactly correspond to climate change and global warming, respectively, the two competing definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global warming) as query hashtags in our research because we think that this refers to global warming in a defined category so cannot be regarded in parallel with the two considered hashtags. We limited the scope of the search to English-language tweets generated between 1 January 2009 and 31 December 2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather than those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or quoted texts cannot directly represent the tweeter's usage pattern of the two terminologies. as these two hashtags exactly correspond to climate change and global warming, respectively, the two competing definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global warming) as query hashtags in our research because we think that this refers to global warming in a defined category so cannot be regarded in parallel with the two considered hashtags. We limited the scope of the search to English-language tweets generated between 1 January 2009 and 31 December 2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather than those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or quoted texts cannot directly represent the tweeter's usage pattern of the two terminologies.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "3. Methods 3.1. Data Source\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity\nplatform [76] for climate issues, we followed the literature [5,8,18] and used tweets to investigate", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "References\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https: // www.hashtags.org / featured / hashtag-history-when-and-what-started-it / (accessed on 16 January 2020).\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the release of the Working Group I Summary for Policymakers. Public Underst. Sci. 2017 , 26 , 815-825. [CrossRef]\n76. Segerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore the ecologies of two climate change protests. Commun. Rev. 2011 , 14 , 197-215. [CrossRef]\n77. Statista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in Millions). 2019. Available online: https: // www.statista.com / statistics / 282087 / number-of-monthly-activetwitter-users / (accessed on 10 October 2019).\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin': Evolution of Twitter users and behavior. In Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, USA, 1-4 June 2014.\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n21 of 22", - "page_start": 19, - "page_end": 20, - "source_file": "pubmed10.pdf" - }, - { - "text": "References\n51. Hermida, A.; Fletcher, F.; Korell, D.; Logan, D. Share, like, recommend: Decoding the social media news consumer. J. Stud. 2012 , 13 , 815-824. [CrossRef]\n52. Small, T.A. What the hashtag? A content analysis of Canadian politics on Twitter. Inf. Commun. Soc. 2011 , 14 , 872-895. [CrossRef]\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. Hum. Serv. 2012 , 30 , 160-185. [CrossRef]\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun. 2016 , 4 , 13.\n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the 6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjav í k, Iceland, 25-27 August 2011.\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hern á ndez, A.; Morris, M.R. Is anyone out there?: Unpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, ON, Canada, 26 April-1 May 2014; pp. 2755-2758.\n57. Tsur, O.; Rappoport, A. What's in a hashtag?: Content based prediction of the spread of ideas in microblogging communities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, Seattle, WA, USA, 8-12 February 2012; pp. 643-652.\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n20 of 22", - "page_start": 18, - "page_end": 19, - "source_file": "pubmed10.pdf" - }, - { - "text": "3.2. Data\nGiven our goal of exploring the di GLYPH<11> erence between the two discourses, the 615,816 tweets containing both hashtags simultaneously were excluded to di GLYPH<11> erentiate between the two datasets following [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained '#globalwarming'. The number of qualified tweets containing #climatechange and #globalwarming in each year is displayed in Figure 1a. Given our goal of exploring the difference between the two discourses, the 615,816 tweets containing both hashtags simultaneously were excluded to differentiate between the two datasets following [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained '#globalwarming'. The number of qualified tweets containing #climatechange and #globalwarming in each year is displayed in Figure 1a.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "3.1. Data Source\nAsTwitter has been recognized as a popular discussion forum [75] and a social activity platform [76] for climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions of climate issues and evolution on social media. Although Twitter's ecosystem has been changing in terms of the number of active users, user demographics, and tweeting conventions in the past years [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter is one of the most popular social websites, we defined our study as characterizing the perception of climate issues among social media users rather than all the netizens or the whole population. distinct perceptions of climate issues and evolution on social media. Although Twitter's ecosystem has been changing in terms of the number of active users, user demographics, and tweeting conventions in the past years [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter is one of the most popular social websites, we defined our study as characterizing the perception of climate issues among social media users rather than all the netizens or the whole population.\n3.2. Data\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming,", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "Where can we open a document saved on OneDrive ?", - "target_page": 2, - "target_passage": "When you save this document in OneDrive, you’ll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Save this for later, access it anywhere\nWhen you save this document in OneDrive, you'll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.\nTry it: Select File > Save As , and then select OneDrive and give this document a name.\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. You can pick up where you left off… even if you left the document open on the computer you're using now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Access files anywhere\nNeed to work on the go and across different devices? Click File > Account to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "View who else is typing\nCo-authoring Word documents that are shared on OneDrive or on a SharePoint site happens in real-time, which means you can easily view where other authors are making changes in the same document that you're currently working in.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - }, - { - "text": "Share and collaborate\nWith this document saved in OneDrive, you can share it with others. They don't even need Word to open it.\nTry it: Select Share , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\nYou can send the link by typing someone's email address or by copying the link and pasting it into a message or chat. If you want them to read the document but not edit it, set their permission to view-only.\nIf they don't have Word, the document will open in their web browser, in Word Online.", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Find recent files\nWhether you only work with files stored on your PC's local hard drive or you store files in multiple shared locations, selecting File > Open takes you to your recently used documents and any files that you may have pinned to your list.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "Display Document Location\nThe Display Document Location setting (Figure 3-7) determines whether the client shows the storage location of each document in the document list by placing an icon next to each entry. The possible locations are cache storage (on the library server or an object server) or archive storage.\nImportant: Use care when you enable this feature. The Display Document Location function can result in degraded search performance because the storage location information for every document that is returned must be retrieved from the Content Manager OnDemand object server.", - "page_start": 77, - "page_end": 78, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 12 Web Protégé\nTo start we need to export the ontology to a file. Note that one of the tabs at the top is History. Select that tab. This tab shows a list of each version of the ontology. There should be 2 versions labelled R1 and R2 (in the right corner of each version). The most recent version is always at the top since that is typically what you want although it is also possible to roll back changes to previous versions. We want to export the latest version R2. Click on the R2 icon. This should give you a drop-down menu with two options: Revert changes in revision 2 and Download revision 2. Select Download revision 2. This will prompt you with the standard file browser for your OS to save a zip file with the new ontology. The ontology is saved with a zip file because ontologies can be large and since Web Protégé is working over a network we may want to limit the network traffic for large ontologies. Select the appropriate place to save the Zip archive file on the machine where you have Protégé. Do the standard things you would do to unzip the file and load it into Protégé. Note that when you unzip the file it will create a directory as well, so the file won't be directly under whatever directory you save it to. Instead, there will be a directory titled something like pizza-with-data-ontologies-owl-REVISION-2 that the OWL file will be in.", - "page_start": 87, - "page_end": 87, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "10.5.3 Removing documents from the Tivoli Storage Manager archive\nRemoving a document from archive storage means that the backup (if the primary document copy is in cache) or long-term copy (if the primary document copy is in archive) of the document is deleted from the system. You remove documents from archive storage when you no longer have a business or legal requirement to keep them.\nA management class contains an archive copy group that specifies the criteria that makes a document eligible for deletion. Documents become eligible for deletion under the following conditions:\n/SM590000 Administrators delete documents from client nodes\n/SM590000 An archived document exceeds the time criteria in the archive copy group (how long archived copies are kept)\nASM does not delete information about expired documents from its database until expiration processing runs. You can run expiration processing either automatically or manually by command. Ensure that expiration processing runs periodically to allow ASM to reuse storage pool space that is occupied by expired documents.\nWhen expiration processing runs, ASM deletes documents from its database. The storage space that these documents used to occupy then becomes reclaimable. For more information, see 'Reclaiming space in storage pools' on page 233.\nYou control automatic expiration processing by using the expiration processing interval ( EXPINTERVAL ) in the server options file ( dsmserv.opt ). You can set the option by editing the dsmserv.opt file. For more information, see the Content Manager OnDemand Installation and Configuration Guide :\nhttp://www.ibm.com/support/knowledgecenter/\nYou can obtain more information in the 'Running expiration processing automatically' section at the following website:", - "page_start": 255, - "page_end": 256, - "source_file": "sg246915.pdf" - }, - { - "text": "Transparent Cloud Tiering\nTransparent cloud tiering is a licensed function that enables volume data to be copied and transferred to cloud storage. The system supports creating connections to cloud service providers to store copies of volume data in private or public cloud storage.\nWith transparent cloud tiering, administrators can move older data to cloud storage to free up capacity on the system. Point-in-time snapshots of data can be created on the system and then copied and stored on the cloud storage. An external cloud service provider manages the cloud storage, which reduces storage costs for the system. Before data can be copied to cloud storage, a connection to the cloud service provider must be created from the system.\nA cloud account is an object on the system that represents a connection to a cloud service provider by using a particular set of credentials. These credentials differ depending on the type of cloud service provider that is being specified. Most cloud service providers require the host name of the cloud service provider and an associated password, and some cloud service providers also require certificates to authenticate users of the cloud storage.\nPublic clouds use certificates that are signed by well-known certificate authorities. Private cloud service providers can use self-signed certificate or a certificate that is signed by a trusted certificate authority. These credentials are defined on the cloud service provider and passed to the system through the administrators of the cloud service provider. A cloud account defines whether the system can successfully communicate and authenticate with the cloud service provider by using the account credentials.\nIf the system is authenticated, it can then access cloud storage to copy data to the cloud storage or restore data that is copied to cloud storage back to the system. The system supports one cloud account to a single cloud service provider. Migration between providers is not supported.\nNote: Before enabling Transparent Cloud Tiering, consider the following requirements:\n/SM590000 Ensure that DNS server is configured on your system and accessible.\n/SM590000 Determine whether your company's security policies require enabled encryption. If yes, ensure that the encryption licenses are properly installed and encryption enabled.\nEach cloud service provider requires different configuration options. The system supports the following cloud service providers:\n/SM590000 SoftLayerfi\n/SM590000 OpenStack Swift\n/SM590000 Amazon S3\nTo view your IBM Spectrum Virtualize cloud provider settings, from the IBM Storwize V7000 Settings pane, point to Settings and click System . Then, select Transparent Cloud Tiering , as shown in Figure 5-76.", - "page_start": 199, - "page_end": 200, - "source_file": "sg247938.pdf" - }, - { - "text": "3.5. The nature of Open Government and the relationship between citizens and Government\nOpen Data are an essential part of Open Government. Almost everybody agrees with this. Agreement on what exactly defines Open Government is, however, less universal. In January 2011 Lucas Cioffi, replying to Alex Howard, wrote:\n15/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nThe biggest difference between Gov 2.0 and OpenGov seems to be how they approach transparency. Gov 2.0 is about transparency through open data and the \"government as a platform\" idea. \"Open Government\" is about Transparency for the sake of accountability, but not necessarily interaction, cooperation and reuse of data outside the government.\n[who advocates] Open Data does so in order to make it accessible to citizens rather than to hold government accountable. This is not to say that one approach is better than another, but this is to say that there seem to be two very different motivations for advocating for transparency, and they do seem to correlate to whether people label themselves as part of Gov 2.0 or part of OpenGov.\nIn general, reflection and debate on this point is accelerating. At the moment, some characteristics of Open Government on which there is more or less agreement are that Open Government is about:\n· deliberation, choice, influence on decisions and participation as a common citizen\n· letting all citizens use technology to participate, monitor and define government activities. In other words, Government is really Open when it's based on interaction, not only on some set of infrastructures and methods imposed top-down\n· diffused, seamless conversations, that are only possible with digital technologies, online social networks and so on, between public employees and citizens.\nThe obvious potential limit of these definitions is that they rely on a big, still largely unknown factor, that is actual citizen participation. When data are opened, the problem becomes to have everybody use them, in order to actually realize Open Government as defined above. This issue will be explored in detail in the next paragraphs, but we can already say that Open Data are highlighting the critical, weak points in the present and future relationship between citizens and governments.", - "page_start": 14, - "page_end": 15, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "What is the bold keyboard shortcut on word ?", - "target_page": 4, - "target_passage": "Bold (keyboard shortcut: Ctrl+B)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Make your meaning more visual by formatting text\nTo format text, select it, and then select a button in the Font or Paragraph area on the Home tab.\nTry it: Select text in the lines below and choose formatting options so that the text is an example of the formatting it's describing:\nPro tip: If you selected whole words for this exercise, did you notice that Word popped up a little toolbar, with the font formatting options?\nBetween that and keyboard shortcuts like Ctrl+B and Ctrl+I, you save time by not having to go up to the Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Try it: Apply the Heading 1 style:\n1. Put your cursor somewhere in the heading above ('Make magic: use Heading styles') don't select anything.\n2. On the Home tab, find Styles , and select Heading 1 (keyboard shortcut Ctrl+Alt+1).\nTa-da! Now it looks like a heading, and acts like one too.", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Handy to Know…\n You can jump directly to a font. For example, if you want to preview Garamond , click on the name of the font in the Font command and press . Excel will jump to the fonts that start with G and Live Preview will display the text temporarily. Keep typing the name until you reach the required font.\n\nMicrosoft Excel", - "page_start": 21, - "page_end": 21, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n You may have noticed that the text didn't change size when you used the mini toolbar until you actually clicked on a different font size. This is because Live Preview doesn't work with the mini toolbar.\nMicrosoft Excel", - "page_start": 22, - "page_end": 22, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Meeting controls\nWhen you join meetings, a different window will pop-up. These are the controls you need to know:\nTip\nUse [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "4.4 Data input\nData can be entered into the white grid cells only. It is also possible to copy and paste data from one cell to another by using the shortcut keys ' Ctrl + c ' to copy and ' Ctrl + v ' to paste. Each value entered is automatically saved . When the data is entered, it is first shown in bold, and then changes to normal font indicating that the value has been saved. Saving occurs immediately (usually within 1 second), but in case the system becomes slower, the user should wait until data are shown in regular font before exiting the grid . Otherwise, the data entered will not be saved.\nAs mentioned in the previous section, default values are provided for some parameters (yellow cells in the grid). These values can be overwritten if the Party has more accurate data.\nNote: Data that has been entered will be automatically saved.", - "page_start": 17, - "page_end": 17, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "NAVIGATING IN A FILE\nArrow Keys\nMove one cell to the right, left, up or down\nTab\nMove once cell to the right\nCtrl+Home\nTo beginning file\nCtrl+End\nTo end of typed information\nHome\nBeginning of a line\nEnd\nEnd of a line\nPage Down\nDown one screen\nPage Up\nUp one screen\nF5\nTo a specific page\nScroll bars\nAppear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document.\nITTraining@sgul.ac.uk\nPage 2\nSt. George's Information Services", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "CHANGING FONTS\nThe appearance that you choose for your text is referred to as the font or typeface . Font traditionally refers to a combination of typeface, style and size in points (e.g. Arial Bold 12 pt).\nIn Excel 2007, font just refers to the typeface or shape of the letters. Typical classic fonts include Times New Roman , Arial, Century Gothic and Copperplate .", - "page_start": 21, - "page_end": 21, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E722 Font Formatting_2.xlsx...\n Click in cell A1 to make the cell with the main heading the active cell\n\nClick on the drop arrow next to the Font Size command in the Font group on the Home tab to display a gallery of available sizes\n Point to various sizes and notice how Live Preview shows you how the heading will look\n Click on 16 to change the heading to 16 pt\nYou can also change the font size of parts of a document, and you can use the Mini toolbar...\n Click in cell A2\n Click with the right-mouse button to display the minitoolbar and the shortcut menu\n Click on the drop arrow next to Font Size and click on 14\n Click in cell A3 to hide the toolbar", - "page_start": 22, - "page_end": 22, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "To select ranges with the mouse :\n1. Click in the left-most cell of the range\n2. Hold down the key and click in the last cell, Or\n3. Drag the mouse pointer to the bottom right corner of the range\nITTraining@sgul.ac.uk\nPage 13\nSt. George's Information Services\n2\nMicrosoft Excel\nmouse, the keyboard or a combination of the two. Once selected, you can use the range for input, or apply formatting, or copy the cells as required.", - "page_start": 16, - "page_end": 16, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "What is the advise to make the style sets and themes work well ? ", - "target_page": 6, - "target_passage": "They work best when your document is formatted with styles", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Give your doc an instant makeover\nStyle sets and themes let you completely change the look of your document in an instant. They work best when your document is formatted with styles (so it's good that we fixed that Heading style, above).\nTry it: Explore style sets and themes:\n1. On the Design tab, select Themes , and choose a theme from the drop-down. Notice that the gallery of style sets updates to reflect the theme you picked.\n2. Select any theme you like from the drop-down and click to apply.", - "page_start": 5, - "page_end": 5, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "5. REMUNERATION\nThe role, responsibilities and composition of the Remuneration Committee and details of\nthe Company's remuneration objectives and principles, nonexecutive Director remuneration and executive remuneration are set out on pages 37 to 40 of this Annual Report in the Directors' and Executives' Remuneration section, as well as in the Directors' Statutory Report and in Notes 18 and 26 of the Financial Statements.\nDetails of the nature and amount of the remuneration of:\n· the Directors; and\n· the Specified Executives;\nare set out on pages 37 to 40 of this Annual Report.", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "8. Choose the correct word:\nHe asked his manager for advice/advise regarding a problem at work.", - "page_start": 55, - "page_end": 55, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Get writing suggestions\nWith Editor , bring out your best writing. Editor helps you bring out your best writing by giving you intelligent writing suggestions. It also calculates an Editor Score based on the number and types of suggestions you have yet to address. Select an underlined word or phrase to accept or ignore a suggestion.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - }, - { - "text": "LANGUAGE SKILLS AT WORK HOW TO WRITE A COVER LETTER\nIf you've ever applied for a job, you'll know that writing the cover letter is the most difficult part of almost any job application. Your cover letter creates the first impression, and often determines whether an employer will even look at your CV.\nYou need to use this opportunity to introduce yourself and your skills, and to set yourself apart from all the other candidates. You can also use this opportunity to explain any gaps in your CV, and to motivate why you are the right person for the job.\ntips tips tips tips tips tips tips tips tips\nBasic English Language Skills", - "page_start": 44, - "page_end": 45, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Remuneration Consultants\nThe Group engages the services of independent and specialist remuneration consultants from time to time. Under the Corporations Act 2001 , remuneration consultants must be engaged by the Non-Executive Directors and reporting of any remuneration recommendations must be made directly to the Remuneration Committee.", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "8.1 Remuneration and Nominations Committee\nThe Remuneration and Nominations Committee has three members, M D Hannell (chairman), D Hannes and H W Holcombe, all whom are independent Non-Executive Directors, and reports its recommendations to the Board for approval. The Committee determines remuneration levels of senior staff on an individual basis. Advice is sought from an independent consultant based in the U.S.\nThe remuneration of Non-Executive Directors is structured separately from that of the executive Director and senior executives. The Remuneration Report at pages 28 to 43 of this Annual Report sets out details of the Company's policies and practices for remunerating Directors (Executive and Non-Executive) and Key Management Personnel.\nThe Remuneration and Nominations Committee Charter is available in the corporate governance section of Sundance's website.\n- 53 -", - "page_start": 54, - "page_end": 54, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Make magic: use Heading styles\nThe heading for this part ('Make magic: use Heading styles') looks the same as the other headings in this document, but it's not as useful. It's formatted with font settings (font, size, and color), while the other headings are formatted with a Heading style (Heading 1, to be exact).\nSee the little triangle when you mouse over those other headings?\nYou can collapse and expand everything under a heading, like an outline. But this one's not working. Let's fix it.", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Introduction\nThis Remuneration Report forms part of the Directors' Report. It outlines the Remuneration Policy and framework applied by the Company as well as details of the remuneration paid to Key Management Personnel. Key Management Personnel are defined as those persons having the authority and responsibility for planning, directing and controlling the activities of the Company, directly or indirectly, including Directors and members of the Executive Management group.\nThe information provided in this report has been prepared in accordance with s300A and audited as required by section 308 (3c) of the Corporations Act 2001 .\nThe objective of the Company's remuneration philosophy is to ensure that Directors and senior staff are remunerated fairly and responsibly at a level that is competitive, reasonable and appropriate, in order to attract and retain suitably skilled and experienced people.\nDuring the year the Company introduced a STI Plan that is based on Key Management Personnel individual performance measures and a LongTerm Incentive ('LTI') Executive Rights Plan that provides performance-based remuneration to members of management through the issue of Deferred Rights and Performance Rights vesting over a period of three years. These new plans are discussed in further detail later in this report.", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "3.1.1 Working time in hours and at atypical times\nToo many hours of working time and/or working hours at atypical or unsocial times can put the mental and the physical health of humans at risk. It is also regarded as a major contributing factor to work accidents , due to fatigue or exhaustion. 16\nThe main indicator to describe working time is the number of the weekly average working hours of full-time employees. However, regarding its impact on health and safety, other aspects of working time are of the same relevance :\n· How long is the average working day?\n· At which times and days is this work done (typical, atypical times)?\n· How often do long working hours take place?\n· Is the work split between two jobs?\n· How flexible are start and end?\n· How intense is the work during this time (breaks, deadlines)?\n· Which groups of workers have standard working times and which do not (e.g. depending on the sector or the type of contract, e.g. sub-contracted workers or self-employed)?\nThere is a slight trend towards fewer working hours for full-time employees (not 'Employed persons') in the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, a decrease of approximately 15 minutes. 17\nRegarding the weekly hours, there are no striking differences between the EU27 Member States. In 2019, Cyprus, Austria and Malta with a high share of workers in the sector of tourism (accommodation) had the highest number of working hours per week (above 41 hours), and Denmark, the Netherlands and Italy the lowest number (39 or fewer) (full-time, employees, 15-64 years, all NACE codes). 18\nEuropean Agency for Safety and Health at Work - EU-OSHA\n29\nOccupational safety and health in Europe - state and trends 2023\n'Bakers are craftsmen, working mostly at night, unlike other craftsmen who, once their work during the day is done, can grasp sleep, and by this renew the worn-out forces. The bakers are the whole night rushing about, and then, for most of the day, they are forced to indulge in sleep, just like those animals hiding from the sun (Solifugae). Therefore, in the same city there are Antipodes, men who live a life that is contrary to that of others.'", - "page_start": 28, - "page_end": 29, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "Where are the peaks of the VHE blazars ?", - "target_page": 1, - "target_passage": " VHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "5.1. Recent VERITAS Blazar Discoveries\nPrior to the launch of Fermi VERITAS had discovered VHE emission from 2 blazars. These included the first VHE-detected IBL, W Comae [14, 15], and the HBL 1ES0806+524 [16]. VERITAS has discovered 6 VHE blazars since the launch of Fermi. Three of these were initially observed by VERITAS prior to the release of Fermi-LAT results, due to the X-ray brightness of the synchrotron peaks of their SEDs.\nVHEemission from 3C66A was discovered by VERITAS in September 2008 [17] during a flaring episode that was also observed by the Fermi-LAT [18]. The observed flux above 200 GeV was 6% of the Crab Nebula flux and the measured VHE spectrum was very soft (Γ VHE ∼ 4 . 1). RGBJ0710+591 was detected\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "VERITAS Observations of Blazars\nW. Benbow for the VERITAS Collaboration\nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, USA\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is used to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is currently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration's Key Science Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class of identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which are blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE exposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including 8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected results are presented.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "1. Introduction\nvations of VHE blazars, can measure both SED peaks and are crucial for extracting information from the observations of VHE blazars. They are used to constrain the size, magnetic field and Doppler factor of the emission region, as well as to determine the origin (leptonic or hadronic) of the VHE γ -rays. In leptonic scenarios, such MWL observations are used to measure the spectrum of high-energy electrons producing the emission, as well as to elucidate the nature of the seed photons. Additionally, an accurate measure of the cosmological EBL density requires accurate modeling of the blazar's intrinsic VHE emission that can only be performed with contemporaneous MWL observations.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "4. Blazar Discovery Program\nThe blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. However, the program also includes IBLs (intermediatepeaked) and LBLs (low-peaked), as well as flat spectrum radio quasars (FSRQs), in an attempt to increase the types of blazars known to emit VHE γ -rays. The observed targets are drawn from a target list containing objects visible to the telescopes at reasonable zenith angles ( -8 · < δ < 72 · ), without a previously published VHE limit below 1.5% Crab, and with a measured redshift z < 0 . 3. To further the study of the\neConf C091122\nEBL a few objects having a large ( z > 0 . 3) are also included in the target list. The target list includes:\n· All nearby ( z < 0 . 3) HBL and IBL recommended as potential VHE emitters in [5, 6, 7].\n· The X-ray brightest HBL ( z < 0 . 3) in the recent Sedentary [8] and ROXA [9] surveys.\n· Four distant ( z > 0 . 3) BL Lac objects recommended by [5, 10].\n· Several FSRQ recommended as potential VHE emitters in [6, 11].\n· All nearby ( z < 0 . 3) blazars detected by EGRET [12].\n· All nearby ( z < 0 . 3) blazars contained in the Fermi-LAT Bright AGN Sample [13].\n· All sources ( | b | > 10 · ) detected by Fermi-LAT where extrapolations of their MeV-GeV γ -ray spectrum (including EBL absorption; assuming z = 0.3 if the redshift is unknown) indicates a possible VERITAS detection in less than 20 h. This criteria is the focus of the 2009-10 VERITAS blazar discovery program.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "8. Conclusions\nThe Fermi-LAT is already having a significant impact on the blazar KSP. In future seasons, the VERITAS blazar discovery program will focus its discovery program on hard-spectrum blazars detected by Fermi-LAT, and will likely have a greater focus on high-risk/high-reward objects at larger redshifts (0 . 3 < z < 0 . 7). In addition, the number of VHE blazars studied in pre-planned MWL campaigns will increase as data from the Fermi-LAT will be publicly available. In particular, the extensive pre-planned MWL campaigns will focus on objects that are noteworthy for the impact their data may have on understanding the EBL. The simultaneous observations of blazars by VERITAS and Fermi-LAT will completely resolve the higher-energy SED peak, often for the first time, enabling unprecedented constraints on the underlying blazar phenomena to be derived.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "What are the blazars observed in the discovery program ?", - "target_page": 2, - "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "8. Conclusions\nThe Fermi-LAT is already having a significant impact on the blazar KSP. In future seasons, the VERITAS blazar discovery program will focus its discovery program on hard-spectrum blazars detected by Fermi-LAT, and will likely have a greater focus on high-risk/high-reward objects at larger redshifts (0 . 3 < z < 0 . 7). In addition, the number of VHE blazars studied in pre-planned MWL campaigns will increase as data from the Fermi-LAT will be publicly available. In particular, the extensive pre-planned MWL campaigns will focus on objects that are noteworthy for the impact their data may have on understanding the EBL. The simultaneous observations of blazars by VERITAS and Fermi-LAT will completely resolve the higher-energy SED peak, often for the first time, enabling unprecedented constraints on the underlying blazar phenomena to be derived.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "4. Blazar Discovery Program\nThe blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. However, the program also includes IBLs (intermediatepeaked) and LBLs (low-peaked), as well as flat spectrum radio quasars (FSRQs), in an attempt to increase the types of blazars known to emit VHE γ -rays. The observed targets are drawn from a target list containing objects visible to the telescopes at reasonable zenith angles ( -8 · < δ < 72 · ), without a previously published VHE limit below 1.5% Crab, and with a measured redshift z < 0 . 3. To further the study of the\neConf C091122\nEBL a few objects having a large ( z > 0 . 3) are also included in the target list. The target list includes:\n· All nearby ( z < 0 . 3) HBL and IBL recommended as potential VHE emitters in [5, 6, 7].\n· The X-ray brightest HBL ( z < 0 . 3) in the recent Sedentary [8] and ROXA [9] surveys.\n· Four distant ( z > 0 . 3) BL Lac objects recommended by [5, 10].\n· Several FSRQ recommended as potential VHE emitters in [6, 11].\n· All nearby ( z < 0 . 3) blazars detected by EGRET [12].\n· All nearby ( z < 0 . 3) blazars contained in the Fermi-LAT Bright AGN Sample [13].\n· All sources ( | b | > 10 · ) detected by Fermi-LAT where extrapolations of their MeV-GeV γ -ray spectrum (including EBL absorption; assuming z = 0.3 if the redshift is unknown) indicates a possible VERITAS detection in less than 20 h. This criteria is the focus of the 2009-10 VERITAS blazar discovery program.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "5.1. Recent VERITAS Blazar Discoveries\nPrior to the launch of Fermi VERITAS had discovered VHE emission from 2 blazars. These included the first VHE-detected IBL, W Comae [14, 15], and the HBL 1ES0806+524 [16]. VERITAS has discovered 6 VHE blazars since the launch of Fermi. Three of these were initially observed by VERITAS prior to the release of Fermi-LAT results, due to the X-ray brightness of the synchrotron peaks of their SEDs.\nVHEemission from 3C66A was discovered by VERITAS in September 2008 [17] during a flaring episode that was also observed by the Fermi-LAT [18]. The observed flux above 200 GeV was 6% of the Crab Nebula flux and the measured VHE spectrum was very soft (Γ VHE ∼ 4 . 1). RGBJ0710+591 was detected\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "VERITAS Observations of Blazars\nW. Benbow for the VERITAS Collaboration\nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, USA\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is used to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is currently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration's Key Science Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class of identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which are blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE exposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including 8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected results are presented.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "How many VHE blazar candidates were observed by VERITAS between September 2007 andJune 2009 ?", - "target_page": 3, - "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "5.1. Recent VERITAS Blazar Discoveries\nPrior to the launch of Fermi VERITAS had discovered VHE emission from 2 blazars. These included the first VHE-detected IBL, W Comae [14, 15], and the HBL 1ES0806+524 [16]. VERITAS has discovered 6 VHE blazars since the launch of Fermi. Three of these were initially observed by VERITAS prior to the release of Fermi-LAT results, due to the X-ray brightness of the synchrotron peaks of their SEDs.\nVHEemission from 3C66A was discovered by VERITAS in September 2008 [17] during a flaring episode that was also observed by the Fermi-LAT [18]. The observed flux above 200 GeV was 6% of the Crab Nebula flux and the measured VHE spectrum was very soft (Γ VHE ∼ 4 . 1). RGBJ0710+591 was detected\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "VERITAS Observations of Blazars\nW. Benbow for the VERITAS Collaboration\nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, USA\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is used to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is currently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration's Key Science Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class of identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which are blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE exposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including 8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected results are presented.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "5.2. Discoveries Motivated by Fermi-LAT\nThe successful VHE discovery observations by VERITAS of three blazars was motivated primarily by results from the first year of LAT data taking. In particular, the VHE detections of PKS 1424+240 [21] and 1ES0502+675 [22] were the result of VERITAS observations triggered by the inclusion of these objects in the Fermi-LAT Bright AGN List [13]. The former is only the third IBL known to emit VHE gammarays, and the latter is the most distant BL Lac object\n2 RBS0413 was observed further by VERITAS in Fall 2009.\neConf C091122\n( z = 0 . 341) detected in the VHE band. In addition, VERJ0521+211, likely associated with the radio-loud AGN RGBJ0521.8+2112, was detected by VERTAS in ∼ 4 h of observations in October 2009 [23]. These observations were motivated by its identification as a > 30 GeV γ -ray source in the public Fermi-LAT data. Its VHE flux is 5% of the Crab Nebula flux, placing it among the brightest VHE blazars detected in recent years. VERITAS later observed even brighter VHE flaring from VERJ0521+211 in November 2009 [24], leading to deeper VHE observations.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "5.1. Recent VERITAS Blazar Discoveries\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7) during VERITAS observations from December 2008 to March 2009. The initial announcement of the VHE discovery [19] led to its discovery above 1 GeV in the Fermi-LAT data using a special analysis. RBS 0413, a relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 2 . These data resulted in the discovery of VHE gamma-rays ( > 270 γ , ∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Nebula flux. The discovery [20] was announced simultaneously with the LAT MeV-GeV detection. The VHE and other MWL observations, including Fermi-LAT data, for each of these three sources will be the subject of a joint publication involving both the VERITAS and LAT collaborations.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "4. Blazar Discovery Program\nThe blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. However, the program also includes IBLs (intermediatepeaked) and LBLs (low-peaked), as well as flat spectrum radio quasars (FSRQs), in an attempt to increase the types of blazars known to emit VHE γ -rays. The observed targets are drawn from a target list containing objects visible to the telescopes at reasonable zenith angles ( -8 · < δ < 72 · ), without a previously published VHE limit below 1.5% Crab, and with a measured redshift z < 0 . 3. To further the study of the\neConf C091122\nEBL a few objects having a large ( z > 0 . 3) are also included in the target list. The target list includes:\n· All nearby ( z < 0 . 3) HBL and IBL recommended as potential VHE emitters in [5, 6, 7].\n· The X-ray brightest HBL ( z < 0 . 3) in the recent Sedentary [8] and ROXA [9] surveys.\n· Four distant ( z > 0 . 3) BL Lac objects recommended by [5, 10].\n· Several FSRQ recommended as potential VHE emitters in [6, 11].\n· All nearby ( z < 0 . 3) blazars detected by EGRET [12].\n· All nearby ( z < 0 . 3) blazars contained in the Fermi-LAT Bright AGN Sample [13].\n· All sources ( | b | > 10 · ) detected by Fermi-LAT where extrapolations of their MeV-GeV γ -ray spectrum (including EBL absorption; assuming z = 0.3 if the redshift is unknown) indicates a possible VERITAS detection in less than 20 h. This criteria is the focus of the 2009-10 VERITAS blazar discovery program.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "For which language have been introduced the ActiveInference.jl library ?", - "target_page": 1, - "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "3. Using ActiveInference.jl\nIn this section, we provide an overview of the various functions a user will need to operate ActiveInference . This includes functionalities for creating POMDP agents, for simulating behaviour and for fitting the models to data. In the next section, we demonstrate how to use the package on a concrete worked example. ActiveInference is under continual development, and the newest version of the package, including documentation for how to use it, can be found at github.com/ilabcode/ActiveInference.jl.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models\nSamuel William Nehrer 1,† , Jonathan Ehrenreich Laursen 1,† , Conor Heins 2,3, * , Karl Friston 3,4 ,\nChristoph Mathys 5 and Peter Thestrup Waade 5\n1 School of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; 202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.)\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany\n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk\n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK\n5 Interacting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); ptw@cas.au.dk (P.T.W.)\n* Correspondence: cheins@ab.mpg.de\n† These authors contributed equally to this work.\nAbstract: We introduce a new software package for the Julia programming language, the library ActiveInference.jl . To make active inference agents with Partially Observable Markov Decision Process (POMDP) generative models available to the growing research community using Julia, we re-implemented the pymdp library for Python. ActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive and behavioural modelling, as it is used in computational psychiatry, cognitive science and neuroscience. This means that POMDP active inference models can now be easily fit to empirically observed behaviour using sampling, as well as variational methods. In this article, we show how ActiveInference.jl makes building POMDP active inference models straightforward, and how it enables researchers to use them for simulation, as well as fitting them to data or performing a model comparison.\nKeywords: active inference; free energy principle; predictive processing; Markov decision process; cognitive modelling; Julia\nPACS: 87.15.Aa\nMSC: 91-08\nJEL Classification: C63", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "4. Usage Example\nIn this section, we demonstrate a full usage example of how to create an AIF agent, simulate behaviour in a classic T-maze environment and fit the AIF agent to a simulated example dataset. We provide the necessary code to run this simulation. All code required to reproduce the example simulation can be found in an open source OSF repository osf.io/j3k5q/. This example was performed with the current version of ActiveInference.jl (0.1.1); the newest version can be found at github.com/ilabcode/ActiveInference.jl.", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "1. Introduction\nWe introduce a novel software library for Julia, ActiveInference , which lets users produce the simulated behaviour of agents and their internal belief states with active inference (AIF) models, as well as fit such models to empirically observed behaviour. AIF [1-3] is a generally applicable formal framework for understanding and simulating intelligent behaviour that is based in neurobiology and first principles from statistical physics [4-8]. AIF treats action and perception as unified under a joint imperative: to minimise the variational free energy ( VFE ), which quantifies how well the agent's internal generative model explains incoming sensory observations. It is an upper bound on the the surprise from sensory observations, making AIF formally related to prediction error\nAcademic Editor: Astero Provata\nReceived: 25 October 2024 Revised: 2 January 2025 Accepted: 7 January 2025\nPublished: 12 January 2025\nCitation: Nehrer, S.W.; Ehrenreich Laursen, J.; Heins, C.; Friston, K.; Mathys, C.; Thestrup Waade, P. Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models. Entropy 2025 , 27 , 62. https://doi.org/10.3390/e27010062\nCopyright: ©2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/ licenses/by/4.0/).\nEntropy 2025 , 27 , 62\nhttps://doi.org/10.3390/e27010062\nEntropy 2025 , 27 , 62\n2 of 33", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "References\n20. Friston, K.J.; Trujillo-Barreto, N.; Daunizeau, J. DEM: A variational treatment of dynamic systems. NeuroImage 2008 , 41 , 849-885. [CrossRef]\n21. MATLAB, Inc. MATLAB , version: 9.13.0 (R2022b); MATLAB, Inc.: Natick, MA, USA, 2022.\n22. Penny, W.D.; Friston, K.J.; Ashburner, J.T.; Kiebel, S.J.; Nichols, T.E. Statistical Parametric Mapping: The Analysis of Functional Brain Images ; Elsevier: Amsterdam, The Netherlands, 2011; Google-Books-ID: G_qdEsDlkp0C.\n23. Heins, C.; Millidge, B.; Demekas, D.; Klein, B.; Friston, K.; Couzin, I.D.; Tschantz, A. pymdp: A Python library for active inference in discrete state spaces. J. Open Source Softw. 2022 , 7 , 4098. [CrossRef]\n24. Rossum, G.v.; Drake, F.L. The Python Language Reference , Release 3.0.1 [repr.] ed.; Number Pt. 2 in Python Documentation Manual; van Rossum, G., Drake, F.L., Eds.; Python Software Foundation: Hampton, NH, USA, 2010.\n25. Gregoretti, F.; Pezzulo, G.; Maisto, D. cpp-AIF: A multi-core C++ implementation of Active Inference for Partially Observable Markov Decision Processes. Neurocomputing 2024 , 568 , 127065. [CrossRef]\n26. Josuttis, N.M. The C++ Standard Library: A Tutorial and Reference ; Addison-Wesley: Boston, MA, USA, 2012; Google-Books-ID: 9DEJKhasp7gC.", - "page_start": 30, - "page_end": 30, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Existing Project Example: HathiTrust Research Center (HTRC)\nToday, the Center '[s]upports large-scale computational analysis of the works in the HathiTrust Digital Library to facilitate non-profit and educational research.' It includes over 18 million books in over 400 languages from the HathiTrust Digital Library collection. Roughly 58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has limitations in terms of its representation across subject matter, language, geography, and other dimensions. In terms of subject matter, the corpus is skewed towards humanities (64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English,\nAuthors Guild v. HathiTrust, 902 F.Supp.2d 445 (SDNY October 10, 2012) and Authors Guild v. 32 HathiTrust , 755 F.3d 87 (2d Cir. 2014).\nSee https://www.hathitrust.org/member-libraries/member-list/ - the membership is principally US 33 institutions, and most of the non-US members are from English speaking countries or institutions that use English as the primary language of operations.\nThis functionality is limited to scanned books provided by library partners in the US. 34\nTowards a Books Data Commons for AI Training\n14\nGerman is the next-largest language represented at 9%, and is followed by a long-tail of languages by representation.", - "page_start": 14, - "page_end": 15, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "1. Introduction\nJulia uses its 'just-in-time' (JIT) compilations via the LLVM framework to approach the speed of languages like C without relying on external compilers [36]. Julia is also natively auto-differentiable, which means it can solve what is called the two-language problem (i.e., that high-level languages often have to rely on lower-level languages, either for performance or for auto-differentiability; this is the case with standard tools for cognitive modelling, where languages like R [37] must rely on external languages like STAN [38] for Bayesian model fitting). This means that ActiveInference , in conjunction with Turing [39], Julia's powerful library for Bayesian model fitting, and its newly developed extension for behavioural modelling, ActionModels , makes it possible to use cutting-edge Markov Chain Monte Carlo [40] methods, as well as variational methods [35], for Bayesian model fitting with AIF. Crucially, this allows researchers to not only simulate AIF in a fast programming language, but to also fit them to empirical behaviour, as is performed in cognitive modelling and computational psychiatry. Importantly, this also places AIF models in an ecosystem of other models for computational psychiatry so that it can easily be compared with models, like Hierarchical Gaussian Filters [41], and reinforcement learning models, like the classic Rescorla-Wagner model [42]. As part of making ActiveInference.jl available to the scientific community, and to the larger software ecosystem within computational psychiatry, it is implemented as part of the Translational Algorithms for Psychiatry-Advancing Science (TAPAS) ecosystem [43].\nIn the next section, we provide a conceptual and formal introduction to AIF, particularly in the context of using POMDP generative models. In Section 3, we demonstrate how to use the package in practice, both for simulation and parameter estimation. In Section 4, we give a fully worked example of how ActiveInference can be used with a concrete simulated dataset. Finally, we discuss potential applications and future directions for developing the package.\nEntropy 2025 , 27 , 62", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "1. Introduction\n[18,19], that will be implemented in the future.\nTools for simulating POMDP-AIF models were originally developed as part of the DEM [20] library for MATLAB [21] (part of the larger SPM library [22]). Since then, a modal and flexible software package pymdp [23] was created for Python [24], as well as a performance-oriented package cpp-AIF [25] for C++ [26] that can be used across platforms. Finally, the factor graph library RxInfer [27] for Julia [28] has also been used to implement some AIF models on an efficient factor graph back-end [29-31]. The important tools that these packages provide make AIF available for researchers to perform simulation studies and for use in engineering contexts. They do not, however, usually allow for fitting models to empirically observed data, which is a fundamental method used in cognitive modelling [32], often in the context of computational psychiatry [13], to infer the mechanisms underlying variations in behaviour or to investigate the differences between (for example, clinical) populations. Smith and colleagues [33] provided a guide for manually doing variational Bayesian parameter estimation based on empirical data, but only in MATLAB and restricted to a particular class of variational parameter estimation methods (variational Laplace), instead of the sampling-based methods that currently predominate in the field of cognitive modelling [34,35].\nIn this paper, we introduce ActiveInference.jl , a new software library for Julia [28] that aims to provide easy-to-use tools for model fitting with AIF models and to introduce AIF to the growing community of researchers using Julia for computational psychiatry and cognitive modelling. Julia is a free and open-source high-level programming language that retains an easy user interface reminiscent of that in MATLAB and Python. Simultaneously,\nEntropy 2025 , 27 , 62\n3 of 33", - "page_start": 1, - "page_end": 2, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "REFERENCES\n7. Abe T , Buckner SL , Dankel SJ , Jessee MB , Mattocks KT , Mouser JG , Loenneke JP. Skeletal muscle mass in human athletes: what is the upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ ajhb.23102.\nJ Appl Physiol /C15 doi:10.1152/japplphysiol.00342.2024 /C15 www.jappl.org Downloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\nWORLD STRONGMAN AND DEADLIFT CHAMPION", - "page_start": 9, - "page_end": 10, - "source_file": "pubmed12.pdf" - }, - { - "text": "References\nAshish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in neural information processing systems , pages 59986008.\nJesse Vig. 2019. Visualizing Attention in Transformer-Based Language Representation Models. arXiv:1904.02679 [cs, stat] .\nJesse Vig and Yonatan Belinkov. 2019. Analyzing the Structure of Attention in a Transformer Language Model. In Proceedings of the 2019 ACL Workshop BlackboxNLP: Analyzing and Interpreting Neural Networks for NLP , pages 63-76, Florence, Italy. Association for Computational Linguistics.\nDavid Vilares, Michalina Strzyz, Anders Søgaard, and Carlos Gómez-Rodríguez. 2020. Parsing as pretraining. In Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20) .\nElena Voita, Rico Sennrich, and Ivan Titov. 2019a. The Bottom-up Evolution of Representations in the Transformer: A Study with Machine Translation and Language Modeling Objectives. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP) , pages 4387-4397.\nElena Voita, David Talbot, Fedor Moiseev, Rico Sennrich, and Ivan Titov. 2019b. Analyzing Multi-Head Self-Attention: Specialized Heads Do the Heavy Lifting, the Rest Can Be Pruned. arXiv preprint arXiv:1905.09418 .\nElena Voita and Ivan Titov. 2020. InformationTheoretic Probing with Minimum Description Length. arXiv:2003.12298 [cs] .\nEric Wallace, Shi Feng, Nikhil Kandpal, Matt Gardner, and Sameer Singh. 2019a. Universal Adversarial Triggers for Attacking and Analyzing NLP. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLPIJCNLP) , pages 2153-2162, Hong Kong, China. Association for Computational Linguistics.", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "To which system does the AIF apply ?", - "target_page": 2, - "target_passage": "AIF was argued to be applicable to any self organising system that actively maintains a stable boundary that defines its integrity [10], a broad category that includes cells and plants [11], as well as humans [2] and even collectives [12].", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Artificial intelligence\nArtificial intelligence was founded as an academic discipline in 1956, [6] and the field went through multiple cycles of optimism throughout its history, [7][8] followed by periods of disappointment and loss of funding, known as AI winters. [9][10] Funding and interest vastly increased after 2012 when deep learning outperformed previous AI techniques. [11] This growth accelerated further after 2017 with the transformer architecture, [12] and by the early 2020s many billions of dollars were being invested in AI and the field experienced rapid ongoing progress in what has become known as the AI boom. The emergence of advanced generative AI in the midst of the AI boom and its ability to create and modify content exposed several unintended consequences and harms in the present and raised concerns about the risks of AI and its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety and benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Defining artificial intelligence\nSome authors have suggested in practice, that the definition of AI is vague and difficult to define, with contention as to whether classical algorithms should be categorised as AI, [367] with many companies during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not actually use AI in a material way\". [368]", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "AI welfare and rights\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), and if so, to what degree. [388] But if there is a significant chance that a given machine can feel and suffer, then it may be entitled to certain rights or welfare protection measures, similarly to animals. [389][390] Sapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may provide another moral basis for AI rights. [389] Robot rights are also sometimes proposed as a practical way to integrate autonomous agents into society. [391]\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI systems. Similarly to the legal status of companies, it would have conferred rights but also responsibilities. [392] Critics argued in 2018 that granting rights to AI systems would downplay the importance of human rights, and that legislation should focus on user needs rather than speculative futuristic scenarios. They also noted that robots lacked the autonomy to take part to society on their own. [393][394]\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI sentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot analogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created and carelessly exploited. [390][389]", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Artificial intelligence\nArtificial intelligence ( AI ), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. [1] Such machines may be called AIs.\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, many AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.\" [2][3]\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural language processing, perception, and support for robotics. [a] General intelligence-the ability to complete any task performed by a human on an at least equal level-is among the field's long-term goals. [4] To reach these goals, AI researchers have adapted and integrated a wide range of techniques, including search and mathematical optimization, formal logic, artificial neural networks, and methods based on statistics, operations research, and economics. [b] AI also draws upon psychology, linguistics, philosophy, neuroscience, and other fields. [5]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Agents\nArtificial intelligent (AI) agents are software entities designed to perceive their environment, make decisions, and take actions autonomously to achieve specific goals. These agents can interact with users, their environment, or other agents. AI agents are used in various applications, including virtual assistants, chatbots, autonomous vehicles, game-playing systems, and industrial robotics. AI agents operate within the constraints of their programming, available computational resources, and hardware limitations. This means they are restricted to performing tasks within their defined scope and have finite memory and processing capabilities. In real-world applications, AI agents often face time constraints for decision-making and action execution. Many AI agents incorporate learning algorithms, enabling them to improve their performance over time through experience or training. Using machine learning, AI agents can adapt to new situations and optimise their behaviour for their designated tasks. [175][176][177]\nVincent van Gogh in watercolour created by generative AI software", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Ten Year Summary\n(expenses) / income, 2009.AIFRS = 3,509. EBITDA, 2013.AIFRS = 95,010. EBITDA, 2012.AIFRS = 166,732. EBITDA, 2011.AIFRS = 46,481. EBITDA, 2010.AIFRS = 98,178. EBITDA, 2009.AIFRS = 46,330. Impairment losses, 2013.AIFRS = (332,808). Impairment losses, 2012.AIFRS = -. Impairment losses, 2011.AIFRS = -. Impairment losses, 2010.AIFRS = -. Impairment losses, 2009.AIFRS = -. Depreciation & amortisation, 2013.AIFRS = (85,595). Depreciation & amortisation, 2012.AIFRS = (67,553). Depreciation & amortisation, 2011.AIFRS = ( 2 7, 7 7 2 ). Depreciation & amortisation, 2010.AIFRS = (14,004). Depreciation & amortisation, 2009.AIFRS = (11,575). EBIT, 2013.AIFRS = (323,393). EBIT, 2012.AIFRS = 99,179. EBIT, 2011.AIFRS = 18,709. EBIT, 2010.AIFRS = 84,174. EBIT, 2009.AIFRS = 34,755. Net finance (costs) / income, 2013.AIFRS = (16,222). Net finance (costs) / income, 2012.AIFRS = ( 7, 9 0 2 ). Net finance (costs) / income, 2011.AIFRS = (922). Net finance (costs) / income, 2010.AIFRS = (1,823). Net finance", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Ethics\nAI has potential benefits and potential risks. [183] AI may be able to advance science and find solutions for serious problems: Demis Hassabis of DeepMind hopes to \"solve intelligence, and then use that to solve everything else\". [184] However, as the use of AI has become widespread, several unintended consequences and risks have been identified. [185] In-production systems can sometimes not factor ethics and bias into their AI training processes, especially when the AI algorithms are inherently unexplainable in deep learning. [186]", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Ten Year Summary\n(A$'000), 2013.AIFRS = . PROFIT & LOSS (A$'000), 2012.AIFRS = . PROFIT & LOSS (A$'000), 2011.AIFRS = . PROFIT & LOSS (A$'000), 2010.AIFRS = . PROFIT & LOSS (A$'000), 2009.AIFRS = . Sales revenue, 2013.AIFRS = 329,282. Sales revenue, 2012.AIFRS = 357,372. Sales revenue, 2011.AIFRS = 172,356. Sales revenue, 2010.AIFRS = 175,480. Sales revenue, 2009.AIFRS = 113,015. Operating expenses, 2013.AIFRS = (195,064). Operating expenses, 2012.AIFRS = (171,505). Operating expenses, 2011.AIFRS = ( 8 6,147 ). Operating expenses, 2010.AIFRS = ( 74,305). Operating expenses, 2009.AIFRS = (65,599). Administration expenses, 2013.AIFRS = (15,515). Administration expenses, 2012.AIFRS = (12,737). Administration expenses, 2011.AIFRS = (11,304). Administration expenses, 2010.AIFRS = (3,615). Administration expenses, 2009.AIFRS = (4,595). Other (expenses) / income, 2013.AIFRS = (23,693). Other (expenses) / income, 2012.AIFRS = (6,398). Other (expenses) / income, 2011.AIFRS = (28,424). Other (expenses) / income, 2010.AIFRS = 618. Other", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Ten Year Summary\n(A$'000), 2009.AIFRS = . Current assets - cash, 2013.AIFRS = 32,987. Current assets - cash, 2012.AIFRS = 90,623. Current assets - cash, 2011.AIFRS = 35,864. Current assets - cash, 2010.AIFRS = 49,098. Current assets - cash, 2009.AIFRS = 29,680. Current assets - other, 2013.AIFRS = 109,575. Current assets - other, 2012.AIFRS = 103,433. Current assets - other, 2011.AIFRS = 70,280. Current assets - other, 2010.AIFRS = 54,203. Current assets - other, 2009.AIFRS = 27,848. Non-current assets, 2013.AIFRS = 6 2 7, 4 2 6. Non-current assets, 2012.AIFRS = 854,403. Non-current assets, 2011.AIFRS = 688,919. Non-current assets, 2010.AIFRS = 265,774. Non-current assets, 2009.AIFRS = 217,4 4 5. Total assets, 2013.AIFRS = 769,988. Total assets, 2012.AIFRS = 1,048,459. Total assets, 2011.AIFRS = 795,063. Total assets, 2010.AIFRS = 369,075. Total assets, 2009.AIFRS = 274,973. Total borrowings, 2013.AIFRS = 199,758. Total borrowings, 2012.AIFRS = 157,544. Total borrowings, 2011.AIFRS = 99,896. Total borrowings, 2010.AIFRS = 11,064. Total borrowings, 2009.AIFRS = 2,144. Other liabilities, 2013.AIFRS = 96,270. Other liabilities, 2012.AIFRS = 115,102. Other liabilities, 2011.AIFRS = 88,243. Other liabilities, 2010.AIFRS = 41,968. Other liabilities, 2009.AIFRS = 27,789. Total liabilities, 2013.AIFRS = 296,028. Total liabilities, 2012.AIFRS = 272,646. Total", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Sexuality\nApplications of AI in this domain include AI-enabled menstruation and fertility trackers that analyze user data to offer prediction, [138] AI-integrated sex toys (e.g., teledildonics), [139] AI-generated sexual education content, [140] and AI agents that simulate sexual and romantic partners (e.g., Replika). [141] AI is also used for the production of non-consensual deepfake pornography, raising significant ethical and legal concerns. [142]\nAI technologies have also been used to attempt to identify online gender-based violence and online sexual grooming of minors. [143][144]", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "What is the definition of POMDP ?", - "target_page": 4, - "target_passage": " The Partially Observable Markov Decision Process is a type of flexible generative model that is widely used in the AIF literature. In discrete time and usually a discrete state space, this model type is parametrised to fit a given task by a set matrices containing probability distributions.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "3. Using ActiveInference.jl\nIn this section, we provide an overview of the various functions a user will need to operate ActiveInference . This includes functionalities for creating POMDP agents, for simulating behaviour and for fitting the models to data. In the next section, we demonstrate how to use the package on a concrete worked example. ActiveInference is under continual development, and the newest version of the package, including documentation for how to use it, can be found at github.com/ilabcode/ActiveInference.jl.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "2.1. POMDPs in Active Inference\nIn AIF, the POMDP is one of the most common families of generative models used to make inferences about the environment. It is a Markovian discrete state-space model, where employing it means representing the environment and observations as inhabiting one among a set of possible (possibly multidimensional) states, and that the changes in these states can only depend on the system's previous state and the agent's actions. Environmental states are not directly observable, so they have to be inferred based on incoming sensory observations. In AIF for POMDPs and other generative models in general, both perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well as the learning of parameters of the generative model (see Section 2.4). Crucially, an agent's generative model does not a priori have to be isomorphic to the true environment (i.e., the data-generating process), although this will generally lead to a successful inference, and that the generative model will therefore often come to resemble the environment through learning.\nAdiscrete state-space POMDP in AIF is conventionally defined by five main sets of parameters: A , B , C , D and E [1,33], see Figure 1. Together, these parametrise the agent's prior beliefs about the prior probability of different states in the environment, how states of the environment change and how they generate observations. Typically, they will be vectors, matrices or tensors; however, henceforth we denote them by their corresponding letter in bold. These make up the components needed for the agent to perform AIF.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "5. Discussion\nAlibrary of pre-made canonical POMDP models could be created so that users can easily implement them directly. Alternatives to the fixed-point iteration method for updating posteriors over environmental states could be included, like the marginal message passing algorithm. There are various ways in which the package can be made more computationally efficient, and it could be compared with other software implementations. There are plenty of utility and plotting functions that could be added to the package to make it easier to use and to facilitate integration with the model-fitting packages it relies on; for example, to allow for combining the models with linear regressions to compare parameters values of different populations in a single model. More complex types of POMDP models can also be added, like hierarchical and temporally deep POMDPs. Model structure learning could be considered, where different model structures are compared and chosen between by evaluating their free energies. Sophisticated inference, where predictions are also made about changes in one's own beliefs-depending on expected action-dependent observations in the future-could also be implemented [58]. Finally, the package could be extended to other types of generative models than POMDPs, including other universal models, like generalised filtering [17] and Hierarchical Gaussian Filter models [41], as well as custom\nEntropy 2025 , 27 , 62\n30 of 33\ngenerative models, or even (deep learning-based) amortised inference models. These various extensions could provide valuable tools for using AIF models in both theoretical and applied research.\nAuthor Contributions: Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and P.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing-original draft preparation, S.W.N. and J.E.L.; writing-review and editing, C.H., K.F., C.M. and P.T.W.; visualisation, S.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and agreed to the published version of this manuscript.", - "page_start": 28, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Abbreviations\nThe following abbreviations are used in this manuscript:\nAIF\nActive inference\nFEP\nFree energy principle\nVFE\nVariational free energy\nEFE\nExpected free energy\nMCMC\nMarkov Chain Monte Carlo\nPOMDP\nPartially Observed Markov Decision Process", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "2.1. POMDPs in Active Inference\nAs noted, here we focus specifically on the POMDP-based generative models often used in the AIF literature. However, the basic steps when performing AIF-perception, action and learning-remain the same across generative models. In the remainder of this section, we describe each of these three steps in turn.\nEntropy 2025 , 27 , 62\n7 of 33\nFigure 1. Depiction of a POMDP generative model. This encodes the agent's expectations about how the state s of the environment changes over time t , and how it generates observation o at each time step. A , also called the observation model, describes how environmental states give rise to observations. B , also called the transition model, describes how environmental states change over time, depending on action u (called policy π when structured into sequences). C is the preference prior, which encodes the agent's preferences for observations. This shapes the expected free energy G associated with each policy, which is used for policy selection. D encodes the agent's prior belief over environmental states before making any observations, and E is the prior over policies that determines the agent's preferences for policies in the absence of other motivation.", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "2. Active Inference with POMDPs\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This should familiarise the reader with the vernacular used in the later sections regarding the functionalities of the package. While various extensions, such as structure learning, which enables an agent to learn the structure or shape of its environment through model comparison [44-47], or hierarchical and temporally deep POMDPs [48,49], are relevant for future work, describing these in detail is beyond the scope of this foundational paper.\nAt the core of AIF lies the minimisation of a variational free energy upper bound on surprise for perception, as well as action. This is motivated by the free energy principle [4-8], which states that self-organising systems can be described as minimising the variational free energy of their sensory states. The minimisation of free energy generally takes two\n4 of 33\nEntropy 2025 , 27 , 62\n5 of 33\nquantities as its target: the variational free energy ( VFE ) in the case of perception and the expected free energy ( EFE ) in the case of action. The VFE is the free energy associated with a given sensory observation and is resolved perceptually by updating beliefs about the environment. The EFE is the free energy that is expected in the future, contingent on a given policy or course of action. Choosing action policies associated with a low EFE lead to reducing uncertainty about the environment, as well as making preferred observations more likely.", - "page_start": 3, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Acknowledgments\n[20] C. Tomlinson, 'On the motion of certain liquids on the surface of water,' Phil. Mag. Ser. 4 39 , 32-48 (1870).\n[21] C. G. Marangoni, 'Ueber die Ausbreitung der Tropfen einer Flussigkeit auf der Oberflache einer anderen,' Ann. Phys. (Poggendorf) 143 , 337-354 (1871).\n[22] O. Karthaus, L. Grasjo, N. Maruyama, and M. Shimomura, 'Formation of ordered mesoscopic polymer arrays by dewetting,' Chaos 9 , 308-314 (1999).\n[23] X. Gu, D. Raghavan, J. F. Douglas, and A. Karim, 'Hole-growth instability in the dewetting of evaporating polymer solution films,' J. Polym. Sci. Pt. B-Polym. Phys. 40 , 2825-2832 (2002).\n[24] S. W. Hong, J. F. Xia, and Z. Q. Lin, 'Spontaneous formation of mesoscale polymer patterns in an evaporating bound solution,' Adv. Mater. 19 , 1413-1417 (2007).\n[25] G. Liu, C. F. Zhang, J. Zhao, and Y. X. Zhu, 'Study of the morphology of the three-phase contact line and its evolution by morphological examination after droplet evaporation of aqueous polymer solutions,' Langmuir 24 , 7923-7930 (2008).\n[26] M. Mertig, U. Thiele, J. Bradt, G. Leibiger, W. Pompe, and H. Wendrock, 'Scanning force microscopy and geometrical analysis of two-dimensional collagen network formation,' Surface and Interface Analysis 25 , 514-521 (1997).\n[27] M. Mertig, U. Thiele, J. Bradt, D. Klemm, and W. Pompe, 'Dewetting of thin collagenous precursor films,' Appl. Phys. A 66 , S565-S568 (1998).", - "page_start": 26, - "page_end": 26, - "source_file": "1001.2669.pdf" - }, - { - "text": "Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models\nSamuel William Nehrer 1,† , Jonathan Ehrenreich Laursen 1,† , Conor Heins 2,3, * , Karl Friston 3,4 ,\nChristoph Mathys 5 and Peter Thestrup Waade 5\n1 School of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; 202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.)\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany\n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk\n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK\n5 Interacting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); ptw@cas.au.dk (P.T.W.)\n* Correspondence: cheins@ab.mpg.de\n† These authors contributed equally to this work.\nAbstract: We introduce a new software package for the Julia programming language, the library ActiveInference.jl . To make active inference agents with Partially Observable Markov Decision Process (POMDP) generative models available to the growing research community using Julia, we re-implemented the pymdp library for Python. ActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive and behavioural modelling, as it is used in computational psychiatry, cognitive science and neuroscience. This means that POMDP active inference models can now be easily fit to empirically observed behaviour using sampling, as well as variational methods. In this article, we show how ActiveInference.jl makes building POMDP active inference models straightforward, and how it enables researchers to use them for simulation, as well as fitting them to data or performing a model comparison.\nKeywords: active inference; free energy principle; predictive processing; Markov decision process; cognitive modelling; Julia\nPACS: 87.15.Aa\nMSC: 91-08\nJEL Classification: C63", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "NAVWEPS 00-801-80 PREFACE\naspect ratio, 1 = . Effectoflift........................................................ EffectofsPeed......................................................, 1 = 68. Effea of altitude.., 1 = . , 1 = 2;. Effect of aspect ratio., 1 = 71. Lift and dra Influcncc of ow aspxt ratio configurations f characteristics, 1 = . EFFECT StiEEPtiACK., 1 = 74. Spanwise lift distribution localinducedflow................................................., 1 = 74. , 1 = 76. Effect on lift and drag characteristics. .',, 1 = 76. STALL PATI'ERNS., 1 = 77. Pnvorablestallpattern.............................................. EffeaofpIanform.................................................., 1 = ::. Taper, 1 = . Sweepback, 1 = 86. Modifications for stall characteristics., 1 = \nvii\nNAVWEPS 00-801-80 TABLE OF CPNTENTS\n*am", - "page_start": 8, - "page_end": 9, - "source_file": "00-80T-80.pdf" - }, - { - "text": "5. Discussion\n✞ using ParetoSmooth: psis_loo # Calculate the PSIS LOO PSIS_loo = psis_loo(model,results.chains) ✝\n✆\n☎\n✆\nWe introduce ActiveInference.jl , a novel Julia software package for creating and using POMDP-based AIF models for simulation and fitting to empirical data, demonstrating its ease of use on a small parameter study with simulated agents. ActiveInference.jl makes AIF modelling available in a fast language, equipped with an interface and situated in an ecosystem oriented specifically towards cognitive and behavioural modelling.\nImportantly, the ability to fit models to empirical data with sampling-based methods provides value to researchers within cognitive modelling and computational psychiatry: it allows for comparing estimated parameter values between population groups or investigat-\nEntropy 2025 , 27 , 62\n29 of 33\ning the temporal dynamics of belief changes in experimental participants. Dynamic belief trajectories can then be related to other (for example, physiological) measures, as is usual in model-based neuroscience [65]. This method can also, in principle, be used for fitting models to other types of experimentally observable systems, like animals, organoids [66], and simulated or emergent systems [67]. The package can also be used for agent-based modelling in general, for repeating earlier analyses with sampling based model-fitting and for comparing POMDP-based AIF models directly to other types of models.", - "page_start": 27, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "What is dyspnea ?", - "target_page": 2, - "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Take-home Points\nStudy Question: How profoundly are adults with undiagnosed respiratory symptoms affected by dyspnea?\nResults: In community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with preserved ratio impaired spirometry experienced the greatest impact of dyspnea, followed by those with undiagnosed asthma or COPD. Greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nInterpretation: Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity.\nDyspnea refers to a subjective sensation of breathing discomfort. 1 In a study involving a community-based population aged > 70 years, the prevalence of dyspnea was found to be 32%. 2 Dyspnea can lead to limitations in daily activities, reduced exercise tolerance, and heightened mortality risks. 3\nDyspnea not only affects individuals with diagnosed respiratory conditions but also poses a signi /uniFB01 cant burden on those with undiagnosed conditions. In a systematic review by Müller et al, 4 the combined", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nOur study explored dyspnea in community-based adults with undiagnosed respiratory symptoms identi /uniFB01 ed via case /uniFB01 nding. Surprisingly, we found that the dyspnea experienced by those with PRISm had a greater impact on their activities and health status than those with newly diagnosed COPD or asthma.\nThe prevalence of individuals who were obese and morbidly obese in the PRISm group partially explains the between-group difference in dyspnea. The excess dyspnea seen in the PRISm group when compared with the normal spirometry group is partly explained by patient-speci /uniFB01 c risk factors, including BMI, which shrink the mean dyspnea differential between the groups from 11.2 to 5.5 points (Tables 3-6). The remaining 5.5point difference indicates that PRISm patients have excess dyspnea relative to symptomatic individuals with normal spirometry for additional reasons other than obesity.\n[\n166#6 CHEST DECEMBER 2024\n]\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nDyspnea is a complex, subjective symptom that is modi /uniFB01 ed by nonrespiratory factors including psychosocial, social, and environmental in /uniFB02 uences. 5 Interindividual variability in the perception of dyspnea, in /uniFB02 uenced by these nonrespiratory factors, may play an important role. A study conducted by Ziegler et al 24 assessed the perception of dyspnea in 42 healthy individuals using a standardized inspiratory resistive loading stimulus. The study used the modi /uniFB01 ed Borg scale to measure dyspnea perception levels. Among the participants subjected to the same inspiratory resistive load, 31%, 45%, and 24% of participants classi /uniFB01 ed their level of dyspnea as low, intermediate, and high, respectively. The study revealed that differences between individuals contribute considerable variability to the perception of dyspnea, even among healthy participants.\nThe affective dimension of dyspnea can be captured using additional questionnaires (eg, Multidimensional Dyspnea Pro /uniFB01 le, Dyspnea-12). Studies have explored the use of the Multidimensional Dyspnea Pro /uniFB01 le in\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Acknowledgments\nIn conclusion, our study measured dyspnea impact in individuals with no preexisting diagnosis of lung disease who reported respiratory symptoms as part of a purposeful case /uniFB01 nding strategy. Individuals with PRISm exhibited the greatest impact of dyspnea, even higher than those newly diagnosed with asthma or COPD. After adjusting for patient factors, comorbidities, pulmonary diseases, and severity of lung physiologic impairment, most of the variability in dyspnea remained unexplained. We also showed that dyspnea was associated with increased health care utilization, impaired quality of life, and work productivity.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Assessment of the Impact of Participants ' Dyspnea\nAlthough neither the CAT nor the SGRQ are dyspneaspeci /uniFB01 c tools, both are recommended by the Global Initiative for Chronic Obstructive Lung Disease to evaluate symptoms, including dyspnea, 20 and both yield a richer assessment of dyspnea than the modi /uniFB01 ed Medical Research Council breathlessness scale. 20 Fifteen questions were taken from the CAT and SGRQ questionnaires that referred to individuals ' experiences with dyspnea, and a composite measure of dyspnea impact using a weighted sum of the responses to the 15 questions was constructed. Questions were coded so that larger values indicate more impactful dyspnea. Weights used for question responses in calculating the dyspnea impact assessment measure were those of the /uniFB01 rst component of a principal component analysis (PCA) based on the covariance matrix of question responses. Questions with multiple responses and ordinal structure are individually more informative and thus were accorded higher weight than individual true-false questions. No additional PCA component was anticipated a priori to be material for our investigation, and an eigenvalue analysis of the PCA was conducted to verify this assumption.\nThe composite dyspnea impact measure was scaled so its minimum value was 0 if the response to each of the 15 questions was 0, and the maximum value was scaled to 100 if the individual responses for all 15 questions represented the most severe dyspnea response.\n[\n166#6 CHEST DECEMBER 2024\n]", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\noutpatients with cardiorespiratory disease 25 and the Dyspnea-12 in patients with asthma 26 and found that the affective aspect of dyspnea can signi /uniFB01 cantly in /uniFB02 uence the impact of dyspnea on health status, irrespective of the intensity of breathlessness.\nIn those with PRISm, there was a strong, positive association between higher values for the FEV1/FVC ratio and dyspnea. For the PRISm group, a higher FEV1/FVC ratio may re /uniFB02 ect diminished lung compliance due to interstitial lung disease and/or respiratory system restriction due to obesity, which could contribute to worse dyspnea. Conversely, the association of dyspnea with the FEV1/FVC ratio was in the opposite direction for those with asthma or COPD, and a lower FEV1/FVC ratio correlated with worse dyspnea, as expected.\nOur study complements the literature by focusing on adults with undiagnosed respiratory symptoms who were randomly selected and recruited through active case /uniFB01 nding in the community. This increases the generalizability of our results to a broader population. Our dyspnea questions were derived from widely used\nand validated respiratory health questionnaires, and our dyspnea assessment measure is a weighted average of responses to these validated questions. Consequently, the measure has an immediate interpretation in terms of the lived day-to-day experience of individuals.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nAfter adjusting for age, sex, and BMI, dyspnea was associated with an increased likelihood of annual visits to health care providers for respiratory complaints (OR,\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea Regressed on Patient-Speci /uniFB01 c Risk Factors (20.6% of Variability Explained)", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nTable 4 presents the association of dyspnea with patient-speci /uniFB01 c risk factors. Dyspnea impact increased with younger age, being female, higher BMI, higher smoking and smoke exposure history, and total work\n, 1 = . , 2 = . , 3 = . , 4 = ng,. , 5 = . , 6 = . , 7 = . , 8 = . , 9 = . , 1 = . , 2 = . , 3 = . , 4 = gol. , 5 = . , 6 = snow,. , 7 = . , 8 = My. , 9 = . , 1 = . , 2 = . , 3 = . , 4 = . , 5 = My. , 6 = . , 7 = . , 8 = . , 9 = . , 1 = . , 2 = . , 3 = gardening. , 4 = . , 5 = . , 6 = . , 7 = . , 8 = . , 9 = . Dyspnea, 1 = . Dyspnea, 2 = . Dyspnea, 3 = . Dyspnea, 4 = . Dyspnea, 5 = . Dyspnea, 6 = . Dyspnea, 7 = . Dyspnea, 8 = . Dyspnea, 9 = . Questions About, 1 = . Questions About, 2 = . Questions About, 3 = . Questions About, 4 = . Questions About, 5 = . Questions About, 6 = . Questions About, 7 = . Questions About, 8 = . Questions About, 9 = . , 1 = . , 2 = . , 3 = . , 4 = . , 5 = . , 6 = . , 7 = . , 8 = . , 9 = heavy. , 1 = . , 2 = . , 3 = . , 4 = breathing. , 5 = . , 6 = . , 7 = . , 8 = manual. , 9 = manual. , 1 = . , 2 = . , 3 = . , 4 = . , 5 = carrying. , 6 = . , 7 = . , 8 = swimming,. , 9 = . , 1 = 0.123). , 2 = . , 3 = . , 4 = . , 5 = . , 6 = . , 7 = . , 8 = 0.108). , 9 = ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Impact of Dyspnea on Adults With Respiratory Symptoms Without a De /uniFB01 ned Diagnosis\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi /uniFB01 cantly more impactful dyspnea than the control group (mean score, 13.8; 95% CI, 11.8-15.7). Patient-speci /uniFB01 c risk factors including age, sex, BMI, smoking, and comorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the variation was explained by disease classi /uniFB01 cation and another 1.7% by the severity of lung function impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nINTERPRETATION: Our /uniFB01 ndings showed that in community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with PRISm experienced the greatest impact of dyspnea. Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity. CHEST 2024; 166(6):1296-1308\nKEY WORDS: asthma; case /uniFB01 nding; COPD; dyspnea\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n[\n1296\nOriginal Research\n166#6 CHEST DECEMBER 2024\n]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)\nAbsenteeism, Unadjusted.Dyspnea OR (95% CI).0.995 (0.992-0.998).Dyspnea Coef /uniFB01 cient (95% CI) = 0.061 (0.040-0.083). Absenteeism, Unadjusted.P Value..002.P Value = < .001. Absenteeism, Adjusted.Dyspnea OR (95% CI).0.993 (0.990-0.997).Dyspnea Coef /uniFB01 cient (95% CI) = 0.066 (0.044-0.089). Absenteeism, Adjusted.P Value.< .001.P Value = < .001. Presenteeism, Unadjusted.Dyspnea OR (95% CI).0.995 (0.992-0.998).Dyspnea Coef /uniFB01 cient (95% CI) = 0.334 (0.293-0.375). Presenteeism, Unadjusted.P Value..002.P Value = < .001. Presenteeism, Adjusted.Dyspnea OR (95% CI).0.993 (0.990-0.997).Dyspnea Coef /uniFB01 cient (95% CI) = 0.349 (0.306-0.392). Presenteeism, Adjusted.P Value.< .001.P Value = < .001. Work productivity loss, Unadjusted.Dyspnea OR (95% CI).0.995 (0.992-0.998).Dyspnea Coef /uniFB01 cient (95% CI) = 0.368 (0.323-0.413). Work productivity loss, Unadjusted.P Value..002.P Value = < .001. Work productivity loss, Adjusted.Dyspnea OR (95% CI).0.993", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "What are the criterion to be control patient in the dyspnea study ?", - "target_page": 3, - "target_passage": "Control patients reported no respiratory symptoms in the preceding 6 months and obtained a score of 0 on the ASQ.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Take-home Points\nStudy Question: How profoundly are adults with undiagnosed respiratory symptoms affected by dyspnea?\nResults: In community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with preserved ratio impaired spirometry experienced the greatest impact of dyspnea, followed by those with undiagnosed asthma or COPD. Greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nInterpretation: Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity.\nDyspnea refers to a subjective sensation of breathing discomfort. 1 In a study involving a community-based population aged > 70 years, the prevalence of dyspnea was found to be 32%. 2 Dyspnea can lead to limitations in daily activities, reduced exercise tolerance, and heightened mortality risks. 3\nDyspnea not only affects individuals with diagnosed respiratory conditions but also poses a signi /uniFB01 cant burden on those with undiagnosed conditions. In a systematic review by Müller et al, 4 the combined", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nDyspnea is a complex, subjective symptom that is modi /uniFB01 ed by nonrespiratory factors including psychosocial, social, and environmental in /uniFB02 uences. 5 Interindividual variability in the perception of dyspnea, in /uniFB02 uenced by these nonrespiratory factors, may play an important role. A study conducted by Ziegler et al 24 assessed the perception of dyspnea in 42 healthy individuals using a standardized inspiratory resistive loading stimulus. The study used the modi /uniFB01 ed Borg scale to measure dyspnea perception levels. Among the participants subjected to the same inspiratory resistive load, 31%, 45%, and 24% of participants classi /uniFB01 ed their level of dyspnea as low, intermediate, and high, respectively. The study revealed that differences between individuals contribute considerable variability to the perception of dyspnea, even among healthy participants.\nThe affective dimension of dyspnea can be captured using additional questionnaires (eg, Multidimensional Dyspnea Pro /uniFB01 le, Dyspnea-12). Studies have explored the use of the Multidimensional Dyspnea Pro /uniFB01 le in\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nOur study explored dyspnea in community-based adults with undiagnosed respiratory symptoms identi /uniFB01 ed via case /uniFB01 nding. Surprisingly, we found that the dyspnea experienced by those with PRISm had a greater impact on their activities and health status than those with newly diagnosed COPD or asthma.\nThe prevalence of individuals who were obese and morbidly obese in the PRISm group partially explains the between-group difference in dyspnea. The excess dyspnea seen in the PRISm group when compared with the normal spirometry group is partly explained by patient-speci /uniFB01 c risk factors, including BMI, which shrink the mean dyspnea differential between the groups from 11.2 to 5.5 points (Tables 3-6). The remaining 5.5point difference indicates that PRISm patients have excess dyspnea relative to symptomatic individuals with normal spirometry for additional reasons other than obesity.\n[\n166#6 CHEST DECEMBER 2024\n]\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Assessment of the Impact of Participants ' Dyspnea\nAlthough neither the CAT nor the SGRQ are dyspneaspeci /uniFB01 c tools, both are recommended by the Global Initiative for Chronic Obstructive Lung Disease to evaluate symptoms, including dyspnea, 20 and both yield a richer assessment of dyspnea than the modi /uniFB01 ed Medical Research Council breathlessness scale. 20 Fifteen questions were taken from the CAT and SGRQ questionnaires that referred to individuals ' experiences with dyspnea, and a composite measure of dyspnea impact using a weighted sum of the responses to the 15 questions was constructed. Questions were coded so that larger values indicate more impactful dyspnea. Weights used for question responses in calculating the dyspnea impact assessment measure were those of the /uniFB01 rst component of a principal component analysis (PCA) based on the covariance matrix of question responses. Questions with multiple responses and ordinal structure are individually more informative and thus were accorded higher weight than individual true-false questions. No additional PCA component was anticipated a priori to be material for our investigation, and an eigenvalue analysis of the PCA was conducted to verify this assumption.\nThe composite dyspnea impact measure was scaled so its minimum value was 0 if the response to each of the 15 questions was 0, and the maximum value was scaled to 100 if the individual responses for all 15 questions represented the most severe dyspnea response.\n[\n166#6 CHEST DECEMBER 2024\n]", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Acknowledgments\nIn conclusion, our study measured dyspnea impact in individuals with no preexisting diagnosis of lung disease who reported respiratory symptoms as part of a purposeful case /uniFB01 nding strategy. Individuals with PRISm exhibited the greatest impact of dyspnea, even higher than those newly diagnosed with asthma or COPD. After adjusting for patient factors, comorbidities, pulmonary diseases, and severity of lung physiologic impairment, most of the variability in dyspnea remained unexplained. We also showed that dyspnea was associated with increased health care utilization, impaired quality of life, and work productivity.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\noutpatients with cardiorespiratory disease 25 and the Dyspnea-12 in patients with asthma 26 and found that the affective aspect of dyspnea can signi /uniFB01 cantly in /uniFB02 uence the impact of dyspnea on health status, irrespective of the intensity of breathlessness.\nIn those with PRISm, there was a strong, positive association between higher values for the FEV1/FVC ratio and dyspnea. For the PRISm group, a higher FEV1/FVC ratio may re /uniFB02 ect diminished lung compliance due to interstitial lung disease and/or respiratory system restriction due to obesity, which could contribute to worse dyspnea. Conversely, the association of dyspnea with the FEV1/FVC ratio was in the opposite direction for those with asthma or COPD, and a lower FEV1/FVC ratio correlated with worse dyspnea, as expected.\nOur study complements the literature by focusing on adults with undiagnosed respiratory symptoms who were randomly selected and recruited through active case /uniFB01 nding in the community. This increases the generalizability of our results to a broader population. Our dyspnea questions were derived from widely used\nand validated respiratory health questionnaires, and our dyspnea assessment measure is a weighted average of responses to these validated questions. Consequently, the measure has an immediate interpretation in terms of the lived day-to-day experience of individuals.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nAfter adjusting for age, sex, and BMI, dyspnea was associated with an increased likelihood of annual visits to health care providers for respiratory complaints (OR,\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea Regressed on Patient-Speci /uniFB01 c Risk Factors (20.6% of Variability Explained)", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Impact of Dyspnea on Adults With Respiratory Symptoms Without a De /uniFB01 ned Diagnosis\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi /uniFB01 cantly more impactful dyspnea than the control group (mean score, 13.8; 95% CI, 11.8-15.7). Patient-speci /uniFB01 c risk factors including age, sex, BMI, smoking, and comorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the variation was explained by disease classi /uniFB01 cation and another 1.7% by the severity of lung function impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nINTERPRETATION: Our /uniFB01 ndings showed that in community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with PRISm experienced the greatest impact of dyspnea. Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity. CHEST 2024; 166(6):1296-1308\nKEY WORDS: asthma; case /uniFB01 nding; COPD; dyspnea\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n[\n1296\nOriginal Research\n166#6 CHEST DECEMBER 2024\n]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nTable 4 presents the association of dyspnea with patient-speci /uniFB01 c risk factors. Dyspnea impact increased with younger age, being female, higher BMI, higher smoking and smoke exposure history, and total work", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci /uniFB01 c factors and spirometry disease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi /uniFB01 cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\nApproximately 65% of the variability in dyspnea remained unexplained by the factors examined in our study. Most individuals in our study showed normal spirometry results but still carried a substantial burden of dyspnea, an inconsistency that needs explanation. Several factors not included in our analysis may have contributed to the unexplained variation. Environmental factors (eg, air pollution, allergen exposure, seasonal variations in symptoms) are potential contributors to this unexplained variability. 22 Genetic predispositions could also play a signi /uniFB01 cant role, as suggested by a study that revealed that parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. 23 Additionally, /uniFB01 tness could be a contributing factor, especially in individuals with undiagnosed PRISm, asthma, or COPD who may restrict their activities to avoid dyspnea, and hence become deconditioned. 6\nThere were signi /uniFB01 cant but modest differences in mean dyspnea levels across the 17 study sites (data not shown), which are not explained by the risk factors we accounted for in our study. This /uniFB01 nding is not surprising because some of the potential contributing factors previously mentioned and other site-speci /uniFB01 c factors\n(eg, climate, air quality/industrialization, socioeconomic status) of the catchment population tend to vary across study sites.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "What is the revenue of Republic Services in 2002 ?", - "target_page": 2, - "target_passage": " $ 2,365.1", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as follows:", - "page_start": 89, - "page_end": 89, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Automotive & Services and Other Segment\nServices and other revenue increased $624 million, or 29%, in the three months ended September 30, 2024 as compared to the three months ended September 30, 2023. Services and other revenue increased $1.53 billion, or 25%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were primarily due to increases in non-warranty maintenance services and collision revenue, used vehicle revenue, paid Supercharging revenue, insurance services revenue and part sales revenue.", - "page_start": 35, - "page_end": 35, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Years Ended December 31, 2004, 2003 and 2002\nRevenue. Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended December 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to\n34\n2004. Revenue increased by $152.7 million, or 6.5%, from 2002 to 2003. The following table reÖects the components of our revenue growth for the years ended December 31, 2004, 2003 and 2002:", - "page_start": 41, - "page_end": 42, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "k) Revenue\nRevenue from the sale of goods is recognised upon the delivery of goods to the customer. Revenue from the rendering of a service is recognised upon the delivery of the service to the customers. All revenue is stated net of the amount of goods and services tax ('GST').", - "page_start": 68, - "page_end": 68, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "WIRELESS FINANCIAL RESULTS\n$ 1,123. Additions to property, plant and equipment, Years ended December 31.% Chg = (23). Data revenue included in network revenue, Years ended December 31.2013 = $ 3,175. Data revenue included in network revenue, Years ended December 31.2012 = $ 2,722. Data revenue included in network revenue, Years ended December 31.% Chg = 17. Data revenue as % of network revenue, Years ended December 31.2013 = 47 %. Data revenue as % of network revenue, Years ended December 31.2012 = 41 %. Data revenue as % of network revenue, Years ended December 31.% Chg = \n1 Includes the cost of equipment sales and direct channel subsidies.", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Higher Operating Revenue and Adjusted Operating Profit\nGLYPH<129> Consolidated operating revenue was 2 % higher this year compared to 2012, led by an increase in data revenue at Wireless, higher Internet revenue at Cable, higher Next Generation revenue at Business Solutions and higher subscriber revenue at Media. Revenue grew by 3 % in Cable, 7 % in Business Solutions and 5 % in Media, while revenue at Wireless remained unchanged as the increase in data revenue was offset by the decrease in voice revenue.\nGLYPH<129> Consolidated adjusted operating profit rose 3 % this year to $4,993 million, with consolidated adjusted operating profit margins of 39.3 % , resulting from higher revenue, the realization of cost efficiencies and shifts in the mix of revenue from products and services sold.\nGLYPH<129> Postpaid Wireless subscriber growth continued with net additions of 228,000 and lower churn of 1.24 % .\nGLYPH<129> Cable high-speed Internet subscribers grew by 97,000 and cable telephony lines grew by 79,000, while television households decreased by 87,000 compared to 2012.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Revenue Recognition and Deferred Revenue\nThe Company generally provides services under contracts with municipalities or individual customers. Revenue consists primarily of collection fees from commercial, industrial, residential and municipal customers and transfer and landÑll disposal fees charged to third parties. Advance billings are recorded as deferred revenue, and the revenue is then recognized over the period services are provided. Collection, transfer and disposal, and other services accounted for approximately 74.3%, 18.9% and 6.8%, respectively, of consolidated revenue for the year ended December 31, 2004. No one customer has individually accounted for more than 10% of the Company's consolidated revenues or of the Company's reportable segment revenue in any of the past three years.\nThe Company recognizes revenue when all four of the following criteria are met:\n, Persuasive evidence of an arrangement exists such as a service agreement with a municipality, a hauling customer or a disposal customer,\n, Services have been performed such as the collection and hauling of waste or the disposal of waste at a Company-owned disposal facility,\n, The price of the services provided to the customer are Ñxed or determinable, and\n, Collectability is reasonably assured.", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Rendering of Services\nRevenue from a contract to provide services is recognised by reference to the stage of completion of the contract.", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Operating Revenue\nConsolidated revenue increased in 2012 by $140 million from 2011, Wireless contributed $142 million, Cable contributed $49 million and Media contributed $9 million, partially offset by decreases in revenue of $54 million in Business Solutions and in corporate items and intercompany eliminations of $6 million. The increase was due to overall higher subscriber levels, data revenue and equipment sales at Wireless and higher Internet revenue at Cable, partially offset by lower overall revenue at Business Solutions due to the phased exit of the legacy services business.", - "page_start": 59, - "page_end": 59, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Operating Revenue\nOur operating revenue depends on the size of our subscriber base, the average revenue per user and revenue from equipment sales.", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "Who is the Vice Chairmain of the Board of Republic Services ?", - "target_page": 5, - "target_passage": " Harris W. Hudson1 Vice Chairman of the Board", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Officers\nJames E. O'Connor Chairman & Chief Executive Officer Michael J. Cordesman President & Chief Operating Officer David A. Barclay Senior Vice President & General Counsel Tod C. Holmes Senior Vice President & Chief Financial Officer Lee V. Twyford Senior Vice President & Chief Information Officer Brian A. Bales Vice President, Corporate Development Kenneth M. Baylor Vice President, Employee & Labor Relations Tim M. Benter Vice President & Associate General Counsel Jerry S. Clark Vice President & Controller Paul J. Connealy Vice President, Tax Matthew E. Davies Vice President, Environmental Engineering & Compliance Arthur J. Dudzinski\nRegional Vice President - Western Region\nWilliam C. Flower Vice President, Communications Matthew D. Katz Vice President & Associate General Counsel Ronald R. Krall Regional Vice President - Eastern Region Edward A. Lang III Vice President, Finance & Treasurer Thomas E. Miller Regional Vice President - Southwest Region Craig J. Nichols Vice President, Human Resources Charles F. Serianni Vice President & Chief Accounting Officer Robert N. Shepard Regional Vice President - Southern Region Gary L. Sova Vice President, Marketing & Sales Kevin C. Walbridge Regional Vice President - Central Region Gerard W. Wickett\nVice President, Purchasing & Maintenance\nJohn W. Croghan 2, 3, 4 Chairman, Nominating and Corporate Governance Committee Chairman, Rail-Splitter Capital Management, LLC (an investment management firm)", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "18 Philip B. Lind, CM\nExecutive Vice President, Regulatory and Vice Chairman", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "2.4 Nomination Committee\nThe role, responsibilities and membership requirements of the Nomination Committee are documented in the Board Guidelines and in a separate Charter, approved by the Board.\nUnder the Board Guidelines, it is the responsibility of the Nomination Committee to devise the criteria for, and review membership of, and nominations to, the Board. The primary criteria adopted in selection of suitable Board candidates is their capacity to contribute to the ongoing development of the Company having regard to the location and nature of the Company's significant business interests and to the candidates' age and experience by reference to the attributes of existing Board members.\nWhen a Board vacancy exists or where it is considered that the Board would benefit from the services of a new Director with particular skills, the Nomination Committee has responsibility for proposing candidates for consideration by the Board and, where appropriate, engages the services of external consultants.\nPrior to appointment, each Director is provided with a letter of appointment which encloses a copy of the Company's Constitution and of the relevant policies. Additionally, the expectations of the Board in\nrespect to a proposed appointee to the Board and the workings of the Board and its Committees are conveyed in interviews with the Chairman and induction procedures include access to appropriate executives in relation to details of the business of the Company.\nThe Chairman of the Board is the Chairman of the Nomination Committee. The current members of the Nomination Committee, all of whom are independent non-executive Directors, are Mr S Gerlach (Chairman), Mr P C Barnett and Mr G W McGregor.", - "page_start": 31, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "JOHN CHARLES ELLICE-FLINT BSc (Hons)\nAge 54. Managing Director since 19 December 2000, member of the Environmental and Safety Committee of the Board, Director of Santos Finance Ltd and also Chairman of other Santos Ltd subsidiary companies. Thirty years' experience in the international oil and gas industry including twenty six years with Unocal, including as Senior Vice President: Global Exploration and Technology and Vice President: Corporate Planning and Economics. Member and Chair of the South Australian Museum Board.", - "page_start": 42, - "page_end": 42, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "David M. Witman, 56\nExecutive Vice President and General Merchandise Manager, Men's Apparel\nKenneth J. Worzel, 50 Executive Vice President,\nStrategy and Development\nPaige L. Thomas, 43 Executive Vice President and General Merchandise Manager, Nordstrom Rack\nExecutive Vice President and\nExecutive Vice President and General Merchandise Manager, Shoe Division", - "page_start": 91, - "page_end": 91, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Steven C. Mattics, 46\nExecutive Vice President;\nChairman and Chief Executive Officer of\nGeneral Counsel and Secretary\nNordstrom fsb,\nMichael Sato, 48 Executive Vice President,\nRobert B. Sari, 58 Executive Vice President,", - "page_start": 91, - "page_end": 91, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "OFFICERS\nNEIL A. SCHRIMSHER Age 48\nChief Executive Officer\nBENJAMIN J. MONDICS Age 54\nPresident & Chief Operating Officer\nTHOMAS E. ARMOLD Age 57\nVice President - Marketing and Strategic Accounts\nTODD A. BARLETT Age 57\nVice President - Acquisitions and Global Business Development\nFRED D. BAUER Age 46\nVice President - General Counsel & Secretary\nMICHAEL L. COTICCHIA Age 49\nVice President - Chief Human Resources Officer\nMARK O. EISELE Age 55\nVice President - Chief Financial Officer & Treasurer DANIEL T. BREZOVEC Age 51 Corporate Controller JODY A. CHABOWSKI Age 52 Assistant Controller", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Neal S. Wolin\nExecutive Vice President and General Counsel", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Senior Officers\nDoyle Lee Chairman of the Board, President and Chief Executive Officer\nBob Bradberry\nExecutive Vice President Jay Gibbs Executive Vice President Paul Baker Senior Vice President Jean Bryan Senior Vice President Larry Mangrem Senior Vice President and Cashier Louis Sneed Senior Vice President", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Board of Directors\nRand V. Araskog Retired Chairman and Chief Executive, ITT Corporation\n3-chair, 4, 5\nEdward J. Kelly III President and Chief Executive Officer, Mercantile Bankshares Corp. 1, 3, 4\nCharles B. Strauss President and Chief Executive Officer, Unilever United States, Inc.\n1, 3, 4\n1 Audit Committee\n2 Compensation and Personnel Committee\n3 Finance Committee\n4 Legal and Public Affairs Committee\n5 Nominating Committee\nH. Patrick Swygert President, Howard University\n2, 4-chair, 5\nGordon I. Ulmer Retired Chairman and Chief Executive Officer, the former Connecticut Bank and Trust Company\n2-chair, 3, 5\nPaul G. Kirk, Jr. Of Counsel to Sullivan & Worcester, law firm\n1, 2, 5-chair\nThomas M. Marra Executive Vice President, The Hartford; President and Chief Operating Officer, Life Operations\nRobert W. Selander President and Chief Executive Officer, MasterCard International\n1-chair, 2, 4\nDavid K. Zwiener Executive Vice President, The Hartford; President and Chief Operating Officer, Property & Casualty Operations\n29\nRamani Ayer Chairman, President and Chief Executive Officer, The Hartford\nDina Dublon Executive Vice President and Chief Financial Officer, JP Morgan Chase & Co.\n1, 2, 3\nDonald R. Frahm Retired Chairman, President and Chief Executive Officer, The Hartford\n1, 3, 5", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "How mush did the Moomba incident cost to Santos in 2004 ?", - "target_page": 12, - "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "PRODUCTION HAMPERED BY MOOMBA INCIDENT\n2004 production was lower due to the Moomba incident, which reduced production by 4.6 million\nboe. Field decline reduced production by a further 5.0 million boe.\nOffsetting these factors, Santos' growth projects are starting to come on line and have begun to reverse the decline experienced over the past three years. Two projects were commissioned in 2004: the Bayu-Undan liquids project and the Minerva gas project. In addition, acquisitions contributed 0.8 million boe to production.\nFor 2005, production is expected to improve by around 15%, or 4% excluding the impact of the Moomba incident. Santos now expects production to be around 54 million boe in 2005. This increase is largely driven by the commissioning of Mutineer-Exeter in March 2005 and the John Brookes gas field in the middle of the year.", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "(c) Acquisition of controlled entities\nyear the following controlled entities were registered:. During the financial year the following controlled entities were registered:, Consolidated.2003 $million = . During the financial year the following controlled entities were registered:, Santos Ltd.2004 $million = . During the financial year the following controlled entities were registered:, Santos Ltd.2003 $million = . Santos Direct Pty Ltd, Consolidated.2004 $million = Santos Brantas Pty Ltd. Santos Direct Pty Ltd, Consolidated.2003 $million = . Santos Direct Pty Ltd, Santos Ltd.2004 $million = . Santos Direct Pty Ltd, Santos Ltd.2003 $million = . Santos Egypt Pty Ltd, Consolidated.2004 $million = Santos (Donggala) Pty Ltd. Santos Egypt Pty Ltd, Consolidated.2003 $million = . Santos Egypt Pty Ltd, Santos Ltd.2004 $million = . Santos Egypt Pty Ltd, Santos Ltd.2003 $million = \nAnnual Report 2004\n71\n72", - "page_start": 72, - "page_end": 73, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\n(4.5). (Profit)/loss on disposal of controlled entities, Santos Ltd.2004 $million = -. (Profit)/loss on disposal of controlled entities, Santos Ltd.2003 $million = 1.0. (b)Individually significant expenses/(gains) included in profit from, Consolidated.2004 $million = . (b)Individually significant expenses/(gains) included in profit from, Consolidated.2003 $million = . (b)Individually significant expenses/(gains) included in profit from, Santos Ltd.2004 $million = . (b)Individually significant expenses/(gains) included in profit from, Santos Ltd.2003 $million = . ordinary activities before income tax, Consolidated.2004 $million = . ordinary activities before income tax, Consolidated.2003 $million = . ordinary activities before income tax, Santos Ltd.2004 $million = . ordinary activities before income tax, Santos Ltd.2003 $million = . Insurance recovery, Consolidated.2004 $million = (116.6). Insurance recovery, Consolidated.2003 $million = -. Insurance recovery, Santos Ltd.2004 $million = (73.8). Insurance recovery, Santos Ltd.2003 $million = -. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Consolidated.2004 $million = 17.5. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Consolidated.2003 $million = -. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Santos Ltd.2004 $million = 11.9. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Santos Ltd.2003 $million = -. Profit on sale of oil and gas assets, Consolidated.2004 $million = (43.9). Profit on sale of oil and gas assets, Consolidated.2003 $million = -. Profit on sale of oil and gas assets, Santos Ltd.2004 $million = (298.4). Profit on sale of oil and gas assets, Santos Ltd.2003 $million = -. Write-down of exploration and development expenditure, Consolidated.2004 $million = 22.1. Write-down of exploration and development expenditure, Consolidated.2003 $million = 59.7. Write-down of exploration and development expenditure, Santos Ltd.2004 $million = 4.6. Write-down of exploration and development expenditure, Santos Ltd.2003 $million = 6.1. Organisation restructure costs included in", - "page_start": 58, - "page_end": 58, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\nstage, Santos Ltd.2003 $million = 33.9. Expenditure transferred from plant and equipment, Consolidated.2004 $million = 60.7. Expenditure transferred from plant and equipment, Consolidated.2003 $million = -. Expenditure transferred from plant and equipment, Santos Ltd.2004 $million = 17.6. Expenditure transferred from plant and equipment, Santos Ltd.2003 $million = -. Expenditure written off during the year, Consolidated.2004 $million = (16.3). Expenditure written off during the year, Consolidated.2003 $million = (3.9). Expenditure written off during the year, Santos Ltd.2004 $million = -. Expenditure written off during the year, Santos Ltd.2003 $million = -. Cost at the end of the year, Consolidated.2004 $million = 5,800.1. Cost at the end of the year, Consolidated.2003 $million = 5,190.6. Cost at the end of the year, Santos Ltd.2004 $million = 1,870.7. Cost at the end of the year, Santos Ltd.2003 $million = 1,752.4. Less accumulated depletion, Consolidated.2004 $million = (2,965.0). Less accumulated depletion, Consolidated.2003 $million = (2,667.8). Less accumulated depletion, Santos Ltd.2004 $million = (1,044.9). Less accumulated depletion, Santos Ltd.2003 $million = (955.8). , Consolidated.2004 $million = 2,835.1. , Consolidated.2003 $million = 2,522.8. , Santos Ltd.2004 $million = 825.8. , Santos Ltd.2003 $million = 796.6. Areas in the exploration and development stage, Consolidated.2004 $million = . Areas in the exploration and development stage, Consolidated.2003 $million = . Areas in the exploration and development stage, Santos Ltd.2004 $million = . Areas in the exploration and development stage, Santos Ltd.2003 $million = . Cost at the beginning of the year, Consolidated.2004 $million = 422.5. Cost at the beginning of the year, Consolidated.2003 $million = 424.2. Cost at the beginning of the year, Santos Ltd.2004 $million = 107.0. Cost at the beginning of the year, Santos Ltd.2003 $million = 118.0.", - "page_start": 59, - "page_end": 59, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\n$million = 18.3. Prepayments, Consolidated.2003 $million = 14.3. Prepayments, Santos Ltd.2004 $million = 7.7. Prepayments, Santos Ltd.2003 $million = 7.4. Deferred loss on commodity hedges, Consolidated.2004 $million = 3.2. Deferred loss on commodity hedges, Consolidated.2003 $million = -. Deferred loss on commodity hedges, Santos Ltd.2004 $million = 2.3. Deferred loss on commodity hedges, Santos Ltd.2003 $million = -. , Consolidated.2004 $million = 21.5. , Consolidated.2003 $million = 14.3. , Santos Ltd.2004 $million = 10.0. , Santos Ltd.2003 $million = 7.4. Non-current, Consolidated.2004 $million = . Non-current, Consolidated.2003 $million = . Non-current, Santos Ltd.2004 $million = . Non-current, Santos Ltd.2003 $million = . Other, Consolidated.2004 $million = 2.9. Other, Consolidated.2003 $million = 1.1. Other, Santos Ltd.2004 $million = -. Other, Santos Ltd.2003 $million = -. 10. Exploration and Development Expenditure, Consolidated.2004 $million = . 10. Exploration and Development Expenditure, Consolidated.2003 $million = . 10. Exploration and Development Expenditure, Santos Ltd.2004 $million = . 10. Exploration and Development Expenditure, Santos Ltd.2003 $million = . At cost, Consolidated.2004 $million = 6,175.3. At cost, Consolidated.2003 $million = 5,613.1. At cost, Santos Ltd.2004 $million = 1,950.7. At cost, Santos Ltd.2003 $million = 1,859.4. Less accumulated depletion, Consolidated.2004 $million = (2,965.0). Less accumulated depletion, Consolidated.2003 $million = (2,667.8). Less accumulated depletion, Santos Ltd.2004 $million = (1,044.9). Less accumulated depletion, Santos Ltd.2003 $million = (955.8). , Consolidated.2004 $million = 3,210.3. , Consolidated.2003 $million = 2,945.3. , Santos Ltd.2004 $million = 905.8. , Santos", - "page_start": 59, - "page_end": 59, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\n65.7. Other entities, Consolidated.2003 $million = 57.2. Other entities, Santos Ltd.2004 $million = 0.4. Other entities, Santos Ltd.2003 $million = 0.4. Less interest capitalised, Consolidated.2004 $million = (32.1). Less interest capitalised, Consolidated.2003 $million = (22.6). Less interest capitalised, Santos Ltd.2004 $million = -. Less interest capitalised, Santos Ltd.2003 $million = -. , Consolidated.2004 $million = 33.6. , Consolidated.2003 $million = 34.6. , Santos Ltd.2004 $million = 91.1. , Santos Ltd.2003 $million = 84.0\nAnnual Report 2004", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\nyear, Santos Ltd.2004 $million = 653.8. Balance at the beginning of the year, Santos Ltd.2003 $million = 621.0. Additions, Consolidated.2004 $million = 461.7. Additions, Consolidated.2003 $million = 358.1. Additions, Santos Ltd.2004 $million = 188.0. Additions, Santos Ltd.2003 $million = 102.2. Acquisitions, Consolidated.2004 $million = 12.6. Acquisitions, Consolidated.2003 $million = 13.5. Acquisitions, Santos Ltd.2004 $million = -. Acquisitions, Santos Ltd.2003 $million = -. Disposals, Consolidated.2004 $million = (26.6). Disposals, Consolidated.2003 $million = (32.2). Disposals, Santos Ltd.2004 $million = (94.5). Disposals, Santos Ltd.2003 $million = (0.3). Depreciation expense, Consolidated.2004 $million = (169.1). Depreciation expense, Consolidated.2003 $million = (168.7). Depreciation expense, Santos Ltd.2004 $million = (85.8). Depreciation expense, Santos Ltd.2003 $million = (69.1). Foreign currency translation, Consolidated.2004 $million = (0.5). Foreign currency translation, Consolidated.2003 $million = (4.4). Foreign currency translation, Santos Ltd.2004 $million = -. Foreign currency translation, Santos Ltd.2003 $million = -. Expenditure transferred to exploration and development, Consolidated.2004 $million = (60.7). Expenditure transferred to exploration and development, Consolidated.2003 $million = -. Expenditure transferred to exploration and development, Santos Ltd.2004 $million = (17.6). Expenditure transferred to exploration and development, Santos Ltd.2003 $million = -. Balance at the end of the year, Consolidated.2004 $million = 2,011.2. Balance at the end of the year, Consolidated.2003 $million = 1,793.8. Balance at the end of the year, Santos Ltd.2004 $million = 643.9. Balance at the end of the year, Santos Ltd.2003 $million = 653.8. 12. Other Financial Assets, Consolidated.2004 $million = . 12. Other Financial Assets, Consolidated.2003 $million = . 12. Other Financial Assets, Santos", - "page_start": 60, - "page_end": 60, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\nExpenditure incurred during the year, Consolidated.2004 $million = 66.1. Expenditure incurred during the year, Consolidated.2003 $million = 109.6. Expenditure incurred during the year, Santos Ltd.2004 $million = 16.4. Expenditure incurred during the year, Santos Ltd.2003 $million = 29.0. Acquisitions, Consolidated.2004 $million = -. Acquisitions, Consolidated.2003 $million = 0.4. Acquisitions, Santos Ltd.2004 $million = -. Acquisitions, Santos Ltd.2003 $million = -. Disposals, Consolidated.2004 $million = -. Disposals, Consolidated.2003 $million = (17.7). Disposals, Santos Ltd.2004 $million = -. Disposals, Santos Ltd.2003 $million = -. Foreign currency translation, Consolidated.2004 $million = (0.4). Foreign currency translation, Consolidated.2003 $million = (1.9). Foreign currency translation, Santos Ltd.2004 $million = -. Foreign currency translation, Santos Ltd.2003 $million = -. Expenditure transferred to areas where production has commenced, Consolidated.2004 $million = (107.2). Expenditure transferred to areas where production has commenced, Consolidated.2003 $million = (36.3). Expenditure transferred to areas where production has commenced, Santos Ltd.2004 $million = (38.8). Expenditure transferred to areas where production has commenced, Santos Ltd.2003 $million = (33.9). Expenditure written off during the year, Consolidated.2004 $million = (5.8). Expenditure written off during the year, Consolidated.2003 $million = (55.8). Expenditure written off during the year, Santos Ltd.2004 $million = (4.6). Expenditure written off during the year, Santos Ltd.2003 $million = (6.1). Cost at the end of the year, Consolidated.2004 $million = 375.2. Cost at the end of the year, Consolidated.2003 $million = 422.5. Cost at the end of the year, Santos Ltd.2004 $million = 80.0. Cost at the end of the year, Santos Ltd.2003 $million = 107.0. Total exploration and development expenditure, Consolidated.2004 $million = 3,210.3. Total exploration and development expenditure, Consolidated.2003 $million = 2,945.3. Total exploration and development expenditure, Santos Ltd.2004 $million =", - "page_start": 59, - "page_end": 59, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "(d) Long-term notes\nyear, Santos Ltd.2004 $million = 0.1. Provision made during the year, Santos Ltd.2003 $million = 0.3. Transfer from/(to) current provision, Consolidated.2004 $million = (0.2). Transfer from/(to) current provision, Consolidated.2003 $million = 0.3. Transfer from/(to) current provision, Santos Ltd.2004 $million = (0.2). Transfer from/(to) current provision, Santos Ltd.2003 $million = 0.3. Carrying amount at end of the year, Consolidated.2004 $million = 2.2. Carrying amount at end of the year, Consolidated.2003 $million = 2.3. Carrying amount at end of the year, Santos Ltd.2004 $million = 2.2. Carrying amount at end of the year, Santos Ltd.2003 $million = 2.3. 17. Other Liabilities, Consolidated.2004 $million = . 17. Other Liabilities, Consolidated.2003 $million = . 17. Other Liabilities, Santos Ltd.2004 $million = . 17. Other Liabilities, Santos Ltd.2003 $million = . Current, Consolidated.2004 $million = . Current, Consolidated.2003 $million = . Current, Santos Ltd.2004 $million = . Current, Santos Ltd.2003 $million = . Deferred foreign currency fluctuations on borrowings, Consolidated.2004 $million = 3.5. Deferred foreign currency fluctuations on borrowings, Consolidated.2003 $million = 10.6. Deferred foreign currency fluctuations on borrowings, Santos Ltd.2004 $million = -. Deferred foreign currency fluctuations on borrowings, Santos Ltd.2003 $million = -. Accrued fluctuations on foreign currency swaps, Consolidated.2004 $million = 11.2. Accrued fluctuations on foreign currency swaps, Consolidated.2003 $million = -. Accrued fluctuations on foreign currency swaps, Santos Ltd.2004 $million = -. Accrued fluctuations on foreign currency swaps, Santos Ltd.2003 $million = -. , Consolidated.2004 $million = 14.7. , Consolidated.2003 $million = 10.6. , Santos Ltd.2004 $million = -. , Santos Ltd.2003 $million = -. Non-current, Consolidated.2004 $million = . Non-current, Consolidated.2003 $million = . Non-current, Santos Ltd.2004 $million = .", - "page_start": 62, - "page_end": 62, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS\n1,840.8. Total land and buildings, plant and equipment, Santos Ltd.2004 $million = 665.4. Total land and buildings, plant and equipment, Santos Ltd.2003 $million = 673.1. Movements during the year, Consolidated.2004 $million = . Movements during the year, Consolidated.2003 $million = . Movements during the year, Santos Ltd.2004 $million = . Movements during the year, Santos Ltd.2003 $million = . Land and buildings, Consolidated.2004 $million = . Land and buildings, Consolidated.2003 $million = . Land and buildings, Santos Ltd.2004 $million = . Land and buildings, Santos Ltd.2003 $million = . Balance at the beginning of the year, Consolidated.2004 $million = 47.0. Balance at the beginning of the year, Consolidated.2003 $million = 45.2. Balance at the beginning of the year, Santos Ltd.2004 $million = 19.3. Balance at the beginning of the year, Santos Ltd.2003 $million = 18.5. Additions, Consolidated.2004 $million = 2.5. Additions, Consolidated.2003 $million = 5.1. Additions, Santos Ltd.2004 $million = 3.2. Additions, Santos Ltd.2003 $million = 2.6. Depreciation expense, Consolidated.2004 $million = (2.0). Depreciation expense, Consolidated.2003 $million = (3.3). Depreciation expense, Santos Ltd.2004 $million = (1.0). Depreciation expense, Santos Ltd.2003 $million = (1.8). Balance at the end of the year, Consolidated.2004 $million = 47.5. Balance at the end of the year, Consolidated.2003 $million = 47.0. Balance at the end of the year, Santos Ltd.2004 $million = 21.5. Balance at the end of the year, Santos Ltd.2003 $million = 19.3. Plant and equipment, Consolidated.2004 $million = . Plant and equipment, Consolidated.2003 $million = . Plant and equipment, Santos Ltd.2004 $million = . Plant and equipment, Santos Ltd.2003 $million = . Balance at the beginning of the year, Consolidated.2004 $million = 1,793.8. Balance at the beginning of the year, Consolidated.2003 $million = 1,627.5. Balance at the beginning of the", - "page_start": 60, - "page_end": 60, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "What is the main focus of the Santos 2005 program ?", - "target_page": 19, - "target_passage": " Oil is the main focus of the 2005 program", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "HIGH IMPACT DRILLING IN 2005\nThe 2005 exploration program has the highest resource potential of any program undertaken at Santos.\nSantos is planning a large, high impact drilling campaign that is already well underway.\nSantos plans to drill 25 wells and will invest $150 million testing prospects within its expanding domestic and international exploration portfolio - up 19% from the $126 million spent on exploration in 2004.\nOil is the main focus of the 2005 program with most activity in the Kutei and East Java Basins offshore Indonesia, the Gulf of\nSuez in Egypt, the Bonaparte Basin in the Timor Sea and the Carnarvon Basin offshore Western Australia.\nThe 2005 program reflects the increasing materiality of Santos' exploration portfolio and continues the emphasis on more globally-focused exploration as an important part of the Company's growth strategy.\nSantos has already had drilling success early in 2005 with the Hiu Aman 1 well - the first to be drilled by Santos in the Donggala PSC. Hiu Aman 1 has indicated the presence of a prolific hydrocarbon system in this area. The discovery should add other lower risk prospects to Santos'", - "page_start": 18, - "page_end": 18, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "(c) Acquisition of controlled entities\nyear the following controlled entities were registered:. During the financial year the following controlled entities were registered:, Consolidated.2003 $million = . During the financial year the following controlled entities were registered:, Santos Ltd.2004 $million = . During the financial year the following controlled entities were registered:, Santos Ltd.2003 $million = . Santos Direct Pty Ltd, Consolidated.2004 $million = Santos Brantas Pty Ltd. Santos Direct Pty Ltd, Consolidated.2003 $million = . Santos Direct Pty Ltd, Santos Ltd.2004 $million = . Santos Direct Pty Ltd, Santos Ltd.2003 $million = . Santos Egypt Pty Ltd, Consolidated.2004 $million = Santos (Donggala) Pty Ltd. Santos Egypt Pty Ltd, Consolidated.2003 $million = . Santos Egypt Pty Ltd, Santos Ltd.2004 $million = . Santos Egypt Pty Ltd, Santos Ltd.2003 $million = \nAnnual Report 2004\n71\n72", - "page_start": 72, - "page_end": 73, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "CORPORATE GOVERNANCE\nFor the third year running, the integrity of Santos' corporate governance was recognised in 2004 with the maximum five-star rating in the Corporate Governance Research Report prepared by Horwath and the University of Newcastle.\nA more detailed overview of corporate governance at Santos follows on page 29 of this Annual Report.\nMore detailed information about sustainability at Santos is contained in the Sustainability Review and copies are available from the Company and via the Santos website www.santos.com.", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "SUPPORTING COMMUNITIES\nSantos has relationships with a number of communities where it operates. Some have been longterm and others are just beginning. Relationships with communities outside Australia, such as Indonesia and the United States, are also emerging as Santos' business grows in these locations.\nSantos made contributions during 2004 to a wide variety of organisations and events through the sponsorship program as part of the Company's commitment to supporting the communities to which it belongs.\nAnnual Report 2004\nPartnerships continued in 2004 with the Australian School of Petroleum, the Adelaide Symphony Orchestra, the State Opera Company of South Australia, the Art Gallery of South Australia and the Lloyd McDermott Foundation.\nOne of the highlights of the 2004 program was the establishment of the Santos Community Fund. It brings together all of the contributions Santos makes to community-based organisations and recognises and supports the efforts of Santos employees who choose to contribute their own time and resources to improving their communities.\nThe 'Our Patch' program was a recipient of this fund in 2004. This is a joint initiative of the Patawalonga and Torrens Catchment Management Boards which encourages the local community to assist with the rehabilitation and management of Adelaide's water catchment.\nSantos has adopted a patch of the River Torrens and employees are assisting with the remediation and revegetation of this area in a volunteering program.", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "LIQUIDS MARKETING ALLIANCE WITH BP\nAnother important marketing development during the year was the decision to outsource the marketing of crude oil and natural gas liquids to BP. The new marketing arrangements are in response to the significantly\nhigher volumes of crude oil that Santos will receive from the Mutineer-Exeter and Oyong projects, coming on stream in 2005, and the increasing globalisation of the liquids marketplace.\nThe validity of this approach has already been demonstrated by the sale of the first Mutineer-Exeter oil cargo at a premium to Tapis despite a discount for the uncertain delivery date.\nSantos continues to build an inventory of high quality options to provide a platform for production growth over the coming years. Santos is committed to a program of diversification while capitalising on the long-term Cooper Basin legacy asset. Most importantly, this involves leveraging the strengths of the core competencies built up over a number of years and Santos' well-positioned domestic gas franchise.\n'During 2004 we brought together everyone at Santos responsible for commercialisation into a single team. One of the outcomes from this was the introduction of gas swaps, where we were able to move gas between Santos assets in different states.'", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "FINANCIAL FLEXIBILITY INTACT\nSantos ended the year in a strong financial position with its financial flexibility intact, despite the record development spending.\nThe FUELS issue was successful and Santos' gearing increased only marginally, despite the large capital program in 2004.\nThis is important in Santos' business as the Company needs to be able to fund exploration success as it occurs, and our development projects are increasing in size.\nAnnual Report 2004\n11\n12\nLeveraging Base Business", - "page_start": 12, - "page_end": 13, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "BRUCE WOOD\nVice President Strategic Projects\nAnnual Report 2004\nSantos' Strategic Projects team focuses on assets that have proven difficult to commercialise or that need to be considered in a regional context rather than on an individual basis.\nThe other key activity for this team has been to lead Santos' continuous improvement focus.", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "MARTYN EAMES\nVice President Corporate and People\nLate in 2004 Santos published First Steps: Sustainability Review , the Company's first standalone publication on this topic. It describes how Santos is implementing the principles of sustainability in the areas of corporate governance, the environment, social responsibility and economic performance.\nAnnual Report 2004\nThis was a significant milestone for Santos as it represents a starting point for the collection of data and the ongoing measurement of performance in the area of sustainability.\nCommunicating with stakeholders is an important activity and the publication of the Sustainability Review is a further extension of Santos' commitment in this regard. Santos applies considerable resources to the communication effort and aims to present information in a clear and concise manner in order to generate a greater understanding of the business by its stakeholders.\nSantos has been recognised for its achievements in this area. Santos' 2003 Annual Report was featured as an example of best practice reporting in PricewaterhouseCoopers' Trends in Corporate Reporting 2004 publication. Reports from companies worldwide are considered in compiling this publication and they must meet specified criteria. This is the third time a Santos annual report has been featured. Santos was also awarded a 2004 Silver Award for Excellence in Annual Reporting for the 2002 Annual Report by the Australasian Reporting Awards.\nReceiving independent recognition for these activities serves as a reference point for Santos' desire to continually improve communication performance.\nSantos has been listed as an inaugural member of the Australian SAM Sustainability Index (AuSSI). The AuSSI tracks the performance of around 70 Australian companies that lead their industry in terms of economic, environmental and", - "page_start": 27, - "page_end": 27, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "FIRST RETAIL GAS SALES WITH SANTOS DIRECT\nAs well as selling gas into the wholesale gas market, Santos secured a retail gas licence from the Victorian Government in 2004. This allows Santos to sell gas direct to industrial customers and into the Victorian spot market through a wholly-owned\nsubsidiary, Santos Direct Pty Ltd ('Santos Direct').\nSantos Direct will market Santos' 10% share of gas production from the Minerva field - around 15 TJ/d - in the offshore Otway Basin, which commenced production at the end of 2004.\nThe move to market and sell gas directly into the Victorian retail market is a first for Santos and leverages off Santos' position as one of Australia's largest gas producers, supplying wholesale gas to major industrial customers and specialist marketers in all mainland Australian states and territories.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "ENHANCING THE PORTFOLIO\nIn 2004, Santos continued its normal business of actively managing its portfolio through the divestment of non-core assets and the acquisition of assets that fit well with existing Santos assets or can add to the ability of the Company to meet its strategic goals.\nAs a result of this activity, Santos realised an after-tax profit of $47.4 million on oil and gas asset sales and will continue to high-grade its portfolio on an ongoing basis.\nSantos entered into an agreement with PT Medco during the first half of 2004 to acquire some of Novus Petroleum's Indonesian and Cooper Basin assets conditional on the success of PT Medco's takeover offer for Novus, which was ultimately successful.\nSpecifically, Santos announced in September 2004 that it had executed formal agreements to acquire an additional 4.75% of the South Australian Cooper Basin, 18% of the Brantas PSC and 9% of the Kakap PSC from Medco for US$110 million. On 31 December 2004, Santos paid Medco US$98 million for the majority of the assets, with payment for the remaining 2.75% of Kakap PSC expected to be made in the first quarter of 2005.\nThis acquisition was an important piece in the strategic puzzle to tie up access to follow-up potential from the successful exploration at Jeruk and to provide a production base for the newly established Indonesian core area.\nAlso during the first half of 2004, Santos divested its remaining 18.4% shareholding in Magellan\nPetroleum Australia Ltd, raising approximately $10.6 million.\nEarly in the second half of 2004, Santos concluded the sale of its non-core onshore Otway Basin interests to Origin Energy for $25.75 million. This sale resulted in an after-tax profit of $18 million that was booked in 2004.\nIn addition, an exploration joint venture was formed with ConocoPhillips in the NT/P61 block offshore Darwin, Northern Territory, to drill the Caldita well and provide Santos with access rights to a potential expansion of the Wickham Point LNG facility. This deal further enhances Santos' infrastructure strategy to leverage its position within vital infrastructure to improve shareholder value while reducing the risk profile of the wildcat exploration program.", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What is the primary aim of the OSPRO cohort study ?", - "target_page": 2, - "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "Abbreviations\nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of Referral and Outcome; OSPRO-ROS: Review of systems screening tool from OSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening tool from OSPRO cohort study", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "Individual predictors of healthcare utilization\nTable 3 Baseline OSPRO questionnaire scores for the full cohort and for those with complete and incomplete follow-up\nOSPRO-ROS 10-item, Label = Mean ± SD. OSPRO-ROS 10-item, Full Cohort at baseline ( n =440) = 2.68 ± 2.38. OSPRO-ROS 10-item, Completed follow-up ( n =246) = 2.52 ± 2.24. OSPRO-ROS 10-item, Did not complete follow-up ( n = 194) = 2.89 ± 2.55. OSPRO-ROS 10-item, p -value a = 0.11. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 2 (0 - 10). , Completed follow-up ( n =246) = 2 (0 - 10). , Did not complete follow-up ( n = 194) = 2.5 (0 - 10). , p -value a = . OSPRO-ROS + 13 items, Label = Mean ± SD. OSPRO-ROS + 13 items, Full Cohort at baseline ( n =440) = 1.25 ± 1.80. OSPRO-ROS + 13 items, Completed follow-up ( n =246) = 1.14 ± 1.52. OSPRO-ROS + 13 items, Did not complete follow-up ( n = 194) = 1.38 ± 2.09. OSPRO-ROS + 13 items, p -value a = 0.17. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 1 (0 - 12). , Completed follow-up ( n =246) = 1 (0 - 7). , Did not complete follow-up ( n = 194) = 1 (0 - 12). , p -value a = . OSPRO-YF 10-item, Label = Mean ± SD. OSPRO-YF 10-item, Full Cohort at baseline ( n =440) = 17.43 ± 6.69. OSPRO-YF 10-item, Completed follow-up ( n =246) = 16.87 ± 6.46. OSPRO-YF 10-item, Did not complete follow-up ( n = 194) = 18.15 ± 6.91.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed5.pdf" - }, - { - "text": "Dataset and patient population\nThis study used data from the Orthopedic Physical Therapy -Investigative Network ' s (OPT-IN) Optimal Screening for Prediction of Referral and Outcome (OSPRO) validation cohort study, a longitudinal prospective study of individuals with knee, shoulder, back or neck pain seeking Physical Therapy in the US. A convenience sample was recruited from December 2014 and December 2015 by participating OPT-IN clinics. The OPT-IN clinics that participated in data collection represented multiple geographic regions in the US including the Mideast, Southeast, Great Lakes, Rocky Mountain States and Far West, with an attempt to balance recruitment between urban and rural settings over the entire OPT-IN network. Physical therapists practicing in these clinics identified eligible participants at initial evaluation and directed them to a secure study website for the informed consent process and baseline self-report assessment. Eligibility criteria have been thoroughly reported elsewhere [19] and were intentionally broad to develop a cohort that was generalizable to those seeking physical therapy for common musculoskeletal conditions in the US. Participants completed follow-up self-reported assessments on the study website at 4 weeks, 6 months and 12 months. Participants were notified of a pending assessment by an email that directed them back to the study website to complete their follow-up assessment. For additional details of the dataset and cohort, readers are directed to the published cohort profile [19].", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "Discussion\nIn future studies, we will embed the OSPRO tools into electronic medical record (EMR) databases to refine and test outcomes prediction models at the health care systems level. Importantly, we will collect clinical encounter data through the EMR and combine it with administrative or billing data to confirm the results of this study with more objective measures of health care use. These studies will also allow us to provide better guidance on how to use the OSPRO tools to identify serious psychiatric involvement or systemic sources of pain that require medical referral. Finally, we will explore alternative scoring strategies for the tools, such as weighted scoring for the OSPRO-ROS and use of predicted full-length psychological questionnaire scores for the OSPRO-YF. Healthcare providers could then use the collective information from these studies to build learning health systems that facilitate effective, real-time clinical decision-making support to improve value of care for patients with musculoskeletal pain.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed5.pdf" - }, - { - "text": "Individual predictors of healthcare utilization\nTable 3 Baseline OSPRO questionnaire scores for the full cohort and for those with complete and incomplete follow-up\nOSPRO-YF 10-item, p -value a = 0.04. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 17 (4 - 47). , Completed follow-up ( n =246) = 16 (4 - 40). , Did not complete follow-up ( n = 194) = 17 (4 - 47). , p -value a = . OSPRO-YF + 7 items, Label = Mean ± SD. OSPRO-YF + 7 items, Full Cohort at baseline ( n =440) = 14.92 ± 5.51. OSPRO-YF + 7 items, Completed follow-up ( n =246) = 14.41 ± 4.93. OSPRO-YF + 7 items, Did not complete follow-up ( n = 194) = 15.57 ± 6.12. OSPRO-YF + 7 items, p -value a = 0.03. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 15 (3 - 34). , Completed follow-up ( n =246) = 14 (3 - 28). , Did not complete follow-up ( n = 194) = 16 (3 - 34). , p -value a = ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed5.pdf" - }, - { - "text": "OSPRO Yellow Flag tool (OSPRO-YF)\nThe OSPRO-YF is a yellow flag assessment tool that includes items from pain vulnerability domains (negative affect and fear-avoidance) and pain resilience domains (positive affect and self-efficacy) to aid with identification of pain-related psychological distress in outpatient orthopedic physical therapy settings [37]. The OSPRO-YF has good concurrent validity with pain intensity and region-specific disability [37] and is capable of predicting pain intensity, disability, quality of life and persistent pain 12 months following physical therapy in patients with musculoskeletal pain [20, 21]. The full-length OSPRO-YF has 17-items, however a shortened 10-item version is also available with an acceptable trade-off in accuracy. Like the OSPRO-ROS, the OSPRO-YF is designed for implementation into electronic medical record (EMR) systems to quickly and accurately identify risk for a variety of clinical outcomes [19]. For statistical analyses, a summary score was derived for each version by adding the item responses after reverse-scoring items 2, 13, 14, 15 and 17 so that higher scores indicate higher pain-related psychological distress. The summary score was then included in each model as a continuous independent variable.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "OSPRO Review of Systems tool (OSPRO-ROS)\nThe OSPRO-ROS is a review-of-systems screening tool for use in outpatient orthopedic physical therapy settings [36]. The OSPRO-ROS has demonstrated good concurrent validity with depression and a comprehensive 97-item battery of non-musculoskeletal symptoms (i.e., red flags). [36] Moderate to strong predictive capabilities of the OSPRO-ROS have been reported for persistence of pain, quality of life, and change in comorbidity 12 months following physical therapy in patients with musculoskeletal pain [20, 21]. The OSPRO-ROS includes standard symptom descriptors to aid with identification of systemic or non-musculoskeletal origins of musculoskeletal pain. It includes questions related to symptoms of the cardiovascular, gastrointestinal, endocrine, nervous, integumentary, pulmonary, and musculoskeletal systems. The full-length 23-item version of the OSPRO-ROS is capable of identifying 100% of positive red-flag responders (i.e. indicating ' yes ' to at least one systemic symptom on a questionnaire) in outpatient orthopedic physical therapy settings. [36] A shorter, 10-item version is also available that has been\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 4 of 14\nshown to identify approximately 95% of positive red-flag responders. For statistical analyses, the ' yes ' responses were added for each version and included in each model as a continuous independent variable.", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "Injection\nTable 5 Overall performance of full logistic multivariate regression models ( n =246)\nDiagnostic tests or imaging = .304 **. Block 1, Emergency room = .430 **. Demographic, Clinical and Comorbidity, Any care = . Demographic, Clinical and Comorbidity, Opioids = . Demographic, Clinical and Comorbidity, Injection = . Demographic, Clinical and Comorbidity, Surgery = . Demographic, Clinical and Comorbidity, Diagnostic tests or imaging = . Demographic, Clinical and Comorbidity, Emergency room = . Block 2, Any care = .314. Block 2, Opioids = .317. Block 2, Injection = .317. Block 2, Surgery = .250. Block 2, Diagnostic tests or imaging = .305. Block 2, Emergency room = .435. OSPRO-YF (10 items), Any care = . OSPRO-YF (10 items), Opioids = . OSPRO-YF (10 items), Injection = . OSPRO-YF (10 items), Surgery = . OSPRO-YF (10 items), Diagnostic tests or imaging = . OSPRO-YF (10 items), Emergency room = . OSPRO-ROS (10 items), Any care = . OSPRO-ROS (10 items), Opioids = . OSPRO-ROS (10 items), Injection = . OSPRO-ROS (10 items), Surgery = . OSPRO-ROS (10 items), Diagnostic tests or imaging = . OSPRO-ROS (10 items), Emergency room = . Block 3, Any care = .321. Block 3, Opioids = .321. Block 3, Injection = .334. Block 3, Surgery = .284. Block 3, Diagnostic tests or imaging = .321. Block 3, Emergency room = .473. OSPRO-YF (+ 7 items), Any care = . OSPRO-YF (+ 7 items), Opioids = . OSPRO-YF (+ 7 items), Injection = . OSPRO-YF (+ 7 items), Surgery = . OSPRO-YF (+ 7 items), Diagnostic tests or imaging = . OSPRO-YF (+ 7 items), Emergency room = . OSPRO-ROS (+ 13 items), Any care = . OSPRO-ROS", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed5.pdf" - }, - { - "text": "Dataset and patient population\nThe primary aim of the OSPRO cohort study was to develop and validate review of systems (i.e. evidence of systemic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in outpatient orthopedic physical therapy settings. These screening tools, once validated and refined for clinical decision making, may improve the value of care delivery by accurately identifying individuals who 1) are appropriate for referral to other providers for management of non-musculoskeletal symptoms, and/or 2) would benefit from enhanced, psychologically-informed physical therapy. Early identification of individuals most appropriate for these modified pathways of care has the potential to reduce wasteful downstream health care utilization, limit the risk of unwarranted and costly care escalation, and improve clinical outcomes. Results of the primary analyses examining the predictive ability of the OSPRO tools for pain, disability, health status, and comorbidity outcomes have been previously published [20]. Pre-planned secondary analyses included prediction of persistent pain state [21] and this current analysis predicting future healthcare utilization. All subjects consented to participation in the study and ethics approval was granted by the University of Florida Institutional Review Board.\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 3 of 14", - "page_start": 1, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "Injection\nTable 7 Summary of consistent individual predictors for each utilization outcome\n10-item OSPRO-YF, Utilization outcome.Opioids = . Change in 10-item OSPRO-YF, Utilization outcome.Injection = . Change in 10-item OSPRO-YF, Utilization outcome.Surgery = X. Change in 10-item OSPRO-YF, Utilization outcome.Diagnostic tests or imaging = . Change in 10-item OSPRO-YF, Utilization outcome.Emergency room = ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What is the range of the pain rating scale ?", - "target_page": 3, - "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Pain intensity\nPain intensity was assessed by the numerical pain rating scale (NPRS) ranging from ' 0 ' (no pain) to ' 10 ' (worst\npain imaginable) [24 -26]. Participants rated their current pain intensity, as well as their best (lowest) and worst (highest) pain intensity over the past 24 h. Current, best and worst pain ratings were averaged for purposes of analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "References\n21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent musculoskeletal pain at 12 months: a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome (OSPRO) validation cohort study. Phys Ther. 2018;98:290 -301.\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009; 169:251 -8.\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain: population perspectives. J Pain Off J Am Pain Soc. 2010;11:343 -50.\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999;83:157 -62.\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999;83:533 -9.\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale in patients with low back pain. Spine. 2005;30:1331 -4.\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip Physiol Ther. 2008;31:491 -502.\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity. J Manip Physiol Ther. 1991;14:409 -15.\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability questionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to rehabilitation and education. New York: Manchester University Press; 1989. p. 187 -204.\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001;81:776 -88.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "Pain-related clinical variables\nPain status was determined using established definitions that account for the duration of pain and activity limitations [22, 23] using the following two questions: 1) ' How long have you been experiencing your current painful symptoms? ' and 2) ' Have you experienced ANY pain and activity limitations every day for the past 3 months? ' Responses to question 1 of ' greater than 90 days ' or responses to question 2 of ' Yes ' were used to classify patients as having persistent pain at initial evaluation.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "Abstract\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively identify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The purpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode of physical therapy for musculoskeletal pain.\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) longitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder pain in physical therapy ( n = 440). Demographics, health-related information, review of systems, comorbidity and pain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in pain intensity, disability, and pain-related psychological distress were measured as treatment response variables. At 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests or imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models were developed for any subsequent care and service-specific utilization.\nResults: Subsequent pain-related healthcare utilization was reported by 43% ( n = 106) of the study sample that completed the 12-month follow-up ( n = 246). Baseline disability and 4-week change in pain intensity were important global predictors of subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain intensity, disability and pain-related psychological distress predicted specific service utilization.\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical therapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability and pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could enhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is required to determine how specific characteristics of the clinical encounter influence future utilization.\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "Discussion\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written\n1-5, No. (%) a.5 = 51 (34). Curation, Physician-written..Mean score (SD) = 4.76 (0.48). Curation, Physician-written.Likert rating 1-5, No. (%) a.1 = 0. Curation, Physician-written.Likert rating 1-5, No. (%) a.2 = 0. Curation, Physician-written.Likert rating 1-5, No. (%) a.3 = 6 (4). Curation, Physician-written.Likert rating 1-5, No. (%) a.4 = 39 (26). Curation, Physician-written.Likert rating 1-5, No. (%) a.5 = 105 (70). Readability, LLM-generated..Mean score (SD) = 4.00 (0.64). Readability, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Readability, LLM-generated.Likert rating 1-5, No. (%) a.2 = 8 (5.3). Readability, LLM-generated.Likert rating 1-5, No. (%) a.3 = 17 (11.3). Readability, LLM-generated.Likert rating 1-5, No. (%) a.4 = 87 (58). Readability, LLM-generated.Likert rating 1-5, No. (%) a.5 = 38 (25.3). Readability, Physician-written..Mean score (SD) = 4.64 (0.49). Readability, Physician-written.Likert rating 1-5, No. (%) a.1 = 0. Readability, Physician-written.Likert rating 1-5, No. (%) a.2 = 0. Readability, Physician-written.Likert rating 1-5, No. (%) a.3 = 5 (3.3). Readability, Physician-written.Likert rating 1-5, No. (%) a.4 = 38 (25.3). Readability, Physician-written.Likert rating", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "OSPRO Yellow Flag tool (OSPRO-YF)\nThe OSPRO-YF is a yellow flag assessment tool that includes items from pain vulnerability domains (negative affect and fear-avoidance) and pain resilience domains (positive affect and self-efficacy) to aid with identification of pain-related psychological distress in outpatient orthopedic physical therapy settings [37]. The OSPRO-YF has good concurrent validity with pain intensity and region-specific disability [37] and is capable of predicting pain intensity, disability, quality of life and persistent pain 12 months following physical therapy in patients with musculoskeletal pain [20, 21]. The full-length OSPRO-YF has 17-items, however a shortened 10-item version is also available with an acceptable trade-off in accuracy. Like the OSPRO-ROS, the OSPRO-YF is designed for implementation into electronic medical record (EMR) systems to quickly and accurately identify risk for a variety of clinical outcomes [19]. For statistical analyses, a summary score was derived for each version by adding the item responses after reverse-scoring items 2, 13, 14, 15 and 17 so that higher scores indicate higher pain-related psychological distress. The summary score was then included in each model as a continuous independent variable.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "Discussion\nThis study identified novel predictors for pain-related utilization outcomes following an episode of physical therapy for a primary complaint of musculoskeletal pain. The most robust finding from these analyses was that baseline disability and change in pain intensity over the first 4 weeks following physical therapy evaluation were consistent predictors of subsequent pain-related healthcare utilization in those participants that completed all follow up. Aside from these robust predictors, other individual predictors of utilization were highly outcome-specific. High model specificity for utilization outcomes observed in this study is consistent with a recent systematic review that found similar levels of model specificity for more traditional outcomes like pain intensity, disability and work absenteeism [14]. Across models, health-related variables were generally stronger predictors than sociodemographic factors, which is also supported by prior research [15, 16]. Additionally, there were cases when prediction models were improved for specific services (e.g. surgery, use of opioids) when considering change in pain, disability or pain-related psychological distress. A notable finding is that the OSPRO-YF had the greatest utility when used to measure change in pain-related psychological distress. Current risk prediction paradigms in musculoskeletal pain consider only baseline pain-related psychological distress. However, these results underscore the importance of\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 11 of 14\nroutine pain-related psychological distress monitoring throughout the early phases of rehabilitation especially if the goal is to identify risk for subsequent pain-related healthcare utilization. The implications of these collective findings are that treatment pathways may provide greater value by 1) addressing modifiable health-related variables like pain, disability and pain-related psychological distress, 2) routine monitoring of these health-related variables and 3) offering treatment alternatives that safely escalate care if needed while minimizing risk of harm and unhelpful utilization.", - "page_start": 9, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "Discussion\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written\n1-5, No. (%) a.5 = 107 (71.3). Correctness, LLM-generated..Mean score (SD) = 4.52 (0.64). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Correctness, LLM-generated.Likert rating 1-5, No. (%) a.2 = 0. Correctness, LLM-generated.Likert rating 1-5, No. (%) a.3 = 13 (8.7). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.4 = 39 (26). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.5 = 98 (65.3). Correctness, Physician-written..Mean score (SD) = 4.90 (0.39). Correctness, Physician-written.Likert rating 1-5, No. (%) a.1 = 0. Correctness, Physician-written.Likert rating 1-5, No. (%) a.2 = 0. Correctness, Physician-written.Likert rating 1-5, No. (%) a.3 = 2 (1.3). Correctness, Physician-written.Likert rating 1-5, No. (%) a.4 = 12 (8). Correctness, Physician-written.Likert rating 1-5, No. (%) a.5 = 136 (90.7). Usefulness, LLM-generated..Mean score (SD) = 4.04 (0.86). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.2 = 12 (8). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.3 = 30 (20). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.4 = 59 (39.3). Usefulness,", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Discussion\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written\nLLM-generated.Likert rating 1-5, No. (%) a.5 = 49 (32.7). Usefulness, Physician-written..Mean score (SD) = 4.36 (0.71). Usefulness, Physician-written.Likert rating 1-5, No. (%) a.1 = 0. Usefulness, Physician-written.Likert rating 1-5, No. (%) a.2 = 5 (3.3). Usefulness, Physician-written.Likert rating 1-5, No. (%) a.3 = 13 (8.7). Usefulness, Physician-written.Likert rating 1-5, No. (%) a.4 = 53 (35.3). Usefulness, Physician-written.Likert rating 1-5, No. (%) a.5 = 79 (52.7)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Opioids\nComorbidity index score (i.e. CCI), baseline pain and change in pain were consistent predictors between the models of opioid utilization. In these models, higher pain (OR = 1.70 -1.76, p < 0.001), CCI (OR = 1.54 -1.60, p < 0.001) and increase in pain (OR = 1.70 -1.71, p <0.001) were associated with higher odds of opioid utilization. These models explained approximately 30% of the variation in opioid use.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What are the health consequences of musculoskeletal pain ?", - "target_page": 1, - "target_passage": "Musculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related ad diction [1].", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "here\n228 WHO: Mental disorders, Key facts and\nIHME: Global Health Data Exchange (GHDx), here\n229 OECD, 2015: Sick on the Job?: Myths and Realities about Mental Health and Work\n230 OECD/European Union, 2018: Health at a Glance: Europe 2018: State of Health in the EU Cycle\n231 Andlin-Sobocki et al., 2005: Cost of disorders of the brain in Europe\n232 Niedhammer et al.; 2021: Update of the fractions of cardiovascular diseases and mental disorders attributable to psychosocial work factors in Europe, here\n233 Norder et al., 2017: Beyond return to work from sickness absence due to mental disorders: 5-year longitudinal study of employment status among production workers, here\n234 Leka & Jain, 2017: EU Compass for Action on Mental Health and Well-Being - Mental Health in the Workplace in Europe\n235 Musculoskeletal disorders refer to backache and/or muscular pains in shoulders, neck, upper limbs and/or lower limbs (hips, legs, knees, feet, etc.). In the medical systematic it is the IC 10 group of diseases: Diseases of the musculoskeletal system and connective tissue.\n236 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU 237 Graveling, 2018: Ergonomics and Musculoskeletal Disorders (MSDs) in the Workplace. A Forensic and Epidemiological Analysis\n238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent longitudinal studies, here\n239 EU-OSHA, 2020: Work-related musculoskeletal disorders: why are they still so prevalent? Evidence from a literature review (p. 15).\n240 EU-OSHA, 2019: Summary - Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU (p. 8).", - "page_start": 149, - "page_end": 149, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Background\nThis study was undertaken in a nationwide, US cohort of patients receiving outpatient physical therapy for a primary complaint of knee, shoulder, back or neck pain. The primary aim of the analysis was to predict incidence of additional pain-related healthcare utilization in the year following the episode of physical therapy for musculoskeletal pain. We considered factors not commonly assessed in outcomes prediction for musculoskeletal pain, like insurance, comorbidities, and treatment response, as well as those more often associated with pain-related outcomes (e.g. psychological distress). This project will lead to the development of potentially novel outcome prediction models for this population in a common, non-pharmacological US healthcare setting. The results of this study will be particularly important in value-based payment settings where enhanced clinical decision-making drives treatment effectiveness and system efficiency.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "4.2.3 Examples of specific prevalence estimates\nThe term 'Musculoskeletal diseases' covers the most common group of diseases (ICD 11-15 'Diseases of the musculoskeletal system or connected tissue'). 235 These diseases have the highest prevalence, approximately 60% of the EU working population report one or several MSDs. 236 MSDs that are caused or made worse by work can be defined as work-related MSDs. 237 Work-related MSDs arise from regular exposure to a certain posture or workload. It is a problem that affects all forms of working environments, from physically arduous work to low-intensity static work. 238\nMoreover, the prevalence of MSDs is not decreasing , as could be expected due to the sectoral shifts of workforce from industry and agriculture to services. The authors of the EU-OSHA study 'Work-related musculoskeletal disorders: why are they still so prevalent?' consider several reasons for this: the ergonomic burden shifted to other tasks, for example, handling of patients instead of handling of heavy loads, more inactivity with other musculoskeletal consequences, more time pressure, an ageing workforce, and inadequate work organisation and contractual arrangements. 239\nThe tremendous shift of workforce to administrative and often digitalised work contributes to an increase of the number of workers suffering from the consequences of physical inactivity due to permanent sedentary work , mostly with digital equipment. The figure below shows the spread of these diseases in different occupations. 240\nEuropean Agency for Safety and Health at Work - EU-OSHA\n87\nOccupational safety and health in Europe - state and trends 2023\nFigure 27: Prevalence of musculoskeletal diseases - EWCS 2015\nAbsence from work due to MSDs accounts for a high proportion of working days lost in EU Member States. In 2015, more than half (53%) of workers with MSDs (including those with other health problems) reported being absent from work during the past year, which is considerably higher than the proportion of workers without health problems (32%). Workers with MSDs are not only more likely to be absent from work, but (given absence) on average are also absent for a longer period. For example, 26% of workers with chronic MSDs and other health problems report being absent for more than eight days during the past year, which is considerably higher than the 7% for workers with no health problems. 241", - "page_start": 86, - "page_end": 87, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Discussion\nThis study identified novel predictors for pain-related utilization outcomes following an episode of physical therapy for a primary complaint of musculoskeletal pain. The most robust finding from these analyses was that baseline disability and change in pain intensity over the first 4 weeks following physical therapy evaluation were consistent predictors of subsequent pain-related healthcare utilization in those participants that completed all follow up. Aside from these robust predictors, other individual predictors of utilization were highly outcome-specific. High model specificity for utilization outcomes observed in this study is consistent with a recent systematic review that found similar levels of model specificity for more traditional outcomes like pain intensity, disability and work absenteeism [14]. Across models, health-related variables were generally stronger predictors than sociodemographic factors, which is also supported by prior research [15, 16]. Additionally, there were cases when prediction models were improved for specific services (e.g. surgery, use of opioids) when considering change in pain, disability or pain-related psychological distress. A notable finding is that the OSPRO-YF had the greatest utility when used to measure change in pain-related psychological distress. Current risk prediction paradigms in musculoskeletal pain consider only baseline pain-related psychological distress. However, these results underscore the importance of\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 11 of 14\nroutine pain-related psychological distress monitoring throughout the early phases of rehabilitation especially if the goal is to identify risk for subsequent pain-related healthcare utilization. The implications of these collective findings are that treatment pathways may provide greater value by 1) addressing modifiable health-related variables like pain, disability and pain-related psychological distress, 2) routine monitoring of these health-related variables and 3) offering treatment alternatives that safely escalate care if needed while minimizing risk of harm and unhelpful utilization.", - "page_start": 9, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "3.2 Physical health risks at work\nThe figure below illustrates country differences, based on data from the EWCS 2015: the values of Ireland (green), the EU28 level (blue) with numbers, and the values of Poland (orange). Poland had a relatively high share of employment in industry of 24%, for which Ireland has a share of 12%. The impact on working conditions can be seen in the share of workers reporting exposures to vibrations (Poland 27%, Ireland 16%) and loud noise (Poland 35%, Ireland 25%).\nFigure 17: Physical health risks compared (%) - EWCS 2015\nEuropean Agency for Safety and Health at Work - EU-OSHA\n42\nOccupational safety and health in Europe - state and trends 2023\nIn a similar way, the levels of ergonomic risks are related with the sectoral structure of a country, determining the type of occupations and work tasks. EU-OSHA provided a detailed analysis of the prevalence of musculoskeletal disorders (MSDs) and the related risk factors in several studies on musculoskeletal diseases, for example, 'Work-related musculoskeletal disorders: why are they still so prevalent?' 58\nAn example of the interrelation between sectors and risks is the connection between the sector aggregate 'Trade, transport, food/accommodation and recreation activities' and three major indicators of ergonomic burden, that is, 'Painful, tiring positions', 'Repetitive hand or arm movements', and 'Carrying or moving heavy loads'.\nSeven countries have a share of employees in this sector of more than 30% (Cyprus, Greece, Spain, Malta, Bulgaria, Croatia and Latvia), and many of them are present in two or three lists of countries with the highest number of responses regarding the indicators.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n43\nOccupational safety and health in Europe - state and trends 2023\nTable 6: Physical health risks, Ergonomics - EWCS 2015\nCountry colours: Cyprus aquamarine, Greece orange, Spain blue.", - "page_start": 41, - "page_end": 43, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "OSPRO Review of Systems tool (OSPRO-ROS)\nThe OSPRO-ROS is a review-of-systems screening tool for use in outpatient orthopedic physical therapy settings [36]. The OSPRO-ROS has demonstrated good concurrent validity with depression and a comprehensive 97-item battery of non-musculoskeletal symptoms (i.e., red flags). [36] Moderate to strong predictive capabilities of the OSPRO-ROS have been reported for persistence of pain, quality of life, and change in comorbidity 12 months following physical therapy in patients with musculoskeletal pain [20, 21]. The OSPRO-ROS includes standard symptom descriptors to aid with identification of systemic or non-musculoskeletal origins of musculoskeletal pain. It includes questions related to symptoms of the cardiovascular, gastrointestinal, endocrine, nervous, integumentary, pulmonary, and musculoskeletal systems. The full-length 23-item version of the OSPRO-ROS is capable of identifying 100% of positive red-flag responders (i.e. indicating ' yes ' to at least one systemic symptom on a questionnaire) in outpatient orthopedic physical therapy settings. [36] A shorter, 10-item version is also available that has been\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 4 of 14\nshown to identify approximately 95% of positive red-flag responders. For statistical analyses, the ' yes ' responses were added for each version and included in each model as a continuous independent variable.", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "Background\nMusculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related addiction [1]. Clinical practice guidelines now recommend non-pharmacological treatment as frontline management for musculoskeletal pain, which will lead\n* Correspondence: trevor.lentz@duke.edu\n1\nDuke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\nNC 27705, USA\nFull list of author information is available at the end of the article\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.\nto increased utilization of services such as physical therapy [1 -3]. Physical therapy is effective for improving disability and reducing costs associated with many musculoskeletal pain conditions [4 -9]. However, pain-related healthcare utilization beyond the physical therapy episode (e.g. subsequent use of surgery, injection, opioids, etc.) may indicate suboptimal treatment response, the presence of more complex needs, or unwarranted escalation of care. Downstream healthcare utilization is not often considered as an outcome of care or indication of treatment effectiveness for musculoskeletal pain. But the importance of\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 2 of 14", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "3.2 Physical health risks at work\nRisks at work that can result in physical harm can be divided into safety and health risks .\nThe main result of insufficient safety is a work accident. A work accident has as immediate consequences either a personal injury, a disease, or death of one or more workers. Eurostat distinguishes between non-fatal and fatal work accidents, and for the majority of sectors it provides also the duration of the absence due to the accident - an indicator for the severity of the injury. Non-fatal accidents at work can cause medium- or long-term health consequences, and in the worst case a permanent disability.\nILO Definition of accident: 'An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.' 51\nPhysical health risks can be caused by a variety of circumstances and exposures or by inadequate ergonomics . Natural circumstances at work can pose such health risks, that is, temperature, storms and floods, unsafe terrain, biological agents and so on; or the risks are due to manmade circumstances, that is, work in buildings, on roofs and towers, on traffic routes, under artificial ventilation. Exposure is a general term to describe the interaction between environment / emissions / contaminants and the human organism. In a workplace context, 'exposure' mainly covers emissions from machinery or from tools and materials, for example, noise, vibration, dust, electromagnetic fields and chemical substances.\nRisks from inadequate ergonomics harm in particular the musculoskeletal system. Ergonomic risks of manual work are typically caused by repetitive hand and arm movements, tiring positions, for example, permanent kneeling or overhead work, lifting and moving of heavy loads, or of patients and so on. A certain ergonomic risk is physical inactivity , in practice sitting most of the working time. Not only administrative tasks but also many occupations in service or industry require permanent sitting, for example, drivers, cashiers, part assembly operators and so on (often called 'sedentary occupations').", - "page_start": 37, - "page_end": 37, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.2 Physical health risks at work\nThe exposure to painful and tiring positions and hand/arm movements are highest in southern and eastern EU Member States. They also seem to be closely correlated to the sector aggregate 'Trade, transport, food/accommodation and recreation activities'. Moving and carrying heavy loads is also connected to the sectors agriculture, manufacturing and construction - Romania, Latvia, Slovakia and Spain are part of the top seven. Looking at the countries for the share of workers who are lifting or moving people, Romania, Sweden and Ireland are the countries with the highest shares (15%, 14% and 13%).\nRegarding occupations, manual workers - craft workers, plant and machine operators, and agricultural workers have the highest score of posture-related risks and ambient ergonomic risks.\nTable 7: Physical health risks, Ergonomics - EWCS 2015 59\nEuropean Agency for Safety and Health at Work - EU-OSHA\n44\nOccupational safety and health in Europe - state and trends 2023\nLooking at the data, it is quite obvious that the northern and the central European countries are underrepresented in the group of countries with the highest share of physical and ergonomic risks. The central European countries (Austria, Germany, the Netherlands, Belgium, Luxembourg and France, and the two northern European countries Denmark and Sweden) are practically not present in these lists. The picture changes if it is about lifting or moving of people, a consequence of the relatively larger relevance of care work in these countries.\nPhysical inactivity and permanent or prolonged sitting or standing is a specific ergonomic risk with health impacts for the musculoskeletal system but also contributing to other health impacts like cardiovascular diseases, tendency to overweight and so on. 60 According to ESENER 2019, the second most frequently reported risk factor in the EU27 was prolonged sitting . By sector, it was most frequently reported by enterprises in financial and insurance activities (92% of establishments in the sector in the EU28), information and communication (92%), and public administration (89%). On average, three to four hours of this sedentary behaviour occurs at work. In the EU, 28% of workers report that their work involves sitting almost all the time and a further 30% report sitting a quarter to three quarters of the time, and throughout Europe 18% of the workers sit more than 7.5 hours a day.", - "page_start": 43, - "page_end": 44, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "References\n21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent musculoskeletal pain at 12 months: a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome (OSPRO) validation cohort study. Phys Ther. 2018;98:290 -301.\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009; 169:251 -8.\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain: population perspectives. J Pain Off J Am Pain Soc. 2010;11:343 -50.\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999;83:157 -62.\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999;83:533 -9.\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale in patients with low back pain. Spine. 2005;30:1331 -4.\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip Physiol Ther. 2008;31:491 -502.\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity. J Manip Physiol Ther. 1991;14:409 -15.\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability questionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to rehabilitation and education. New York: Manchester University Press; 1989. p. 187 -204.\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001;81:776 -88.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "What is Creative Commons ?", - "target_page": 2, - "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "Creative Commons makes sharing easy", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Creative Commons\nPO Box 1866 Mountain View CA 94042 USA +1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "References\n' 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http: // creativecommons.org / licenses / by / 4.0 / ).", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed10.pdf" - }, - { - "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "4.3. Keep past and future separate\n28/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", - "page_start": 27, - "page_end": 27, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "When was the first CC licence created?", - "target_page": 4, - "target_passage": "The first CC License was created in 2002.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "NOW, SHARE YOUR WORK!\nhttps://creativecommons.org/choose/\nTexts are adapted from CC Certification for Educators. CC BY license.\nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\nBY\nSA\nND\nNC", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Anna Tumadóttir, CEO\nThe first CC License was created in 2002. Today, we boast six CC Licenses and two public domain tools, setting a global standard for sharing.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "REMIND THAT…\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\nyou want to give others permissions to freely copy and redistribute your work, and\nyou want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Consultation on the Renewal of Cellular and Personal Communications S ervices (PC S ) S pectrum Licences\nIn March 2011, Industry Canada released its decisions about the renewal process for cellular and PCS licences that began expiring at that time. Key things to note:\nGLYPH<129> At the end of the current licence term, new cellular and PCS licences with a 20-year term will be issued to licensees that are in compliance with all licence conditions.\nGLYPH<129> The previously existing annual fee of $0.0351 per MHz per population of the licenced area will continue to apply to all cellular and PCS licences, including those initially assigned by auction. The Minister of Industry Canada may review and amend the fees during the licence term after further consultation with licensees.\nGLYPH<129> A determination regarding existing research and development conditions of licence was not released at that time and will be released separately. A decision has not been made to date, and until such a time, the current conditions of licence remain in effect.", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "1.1 Licensing\nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International Public License. I typically distribute it as a PDF but if you want to make your own version send me an email and I will send you the Word version. For details on licensing see:\nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode", - "page_start": 4, - "page_end": 4, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.2.6 How to view licensing information\nLicensing information is available for all datasets associated with common licences, which are supported by the Licence Assistant. When available a link to the assistant is provided on left side of a dataset page.\nBy clicking on the licence name (here: cc-by), the Licence Assistant tool is opened in a new window, displaying relevant information for this particular licence.\nEuropean Data Portal Version 4.3 -User Manual\nPage 34 of 57\nBy clicking on the ' Data->Licensing Assistant ' link in the main menu, the Licence Assistant is opened in a new window, displaying relevant information of all supported licences by the tool.\nEuropean Data Portal Version 4.3 -User Manual\nPage 35 of 57", - "page_start": 33, - "page_end": 34, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "What is the di/fference between CC0 and the Public Domain Mark?\nCC0 ('CC Zero') is intended for use only by authors or holders of copyright and related rights (including database rights), in connection with works that are still subject to those rights in one or more countries.\nWhen CC0 is applied to a work, copyright and related rights are relinquished worldwide, making the work free from those restrictions to the greatest extent possible.\nThe Public Domain Mark (PDM) is used to label works that are already free of known copyright restrictions. Unlike CC0, PDM doesn't change the copyright status of a work.\nPDM can be used by anyone, and is intended for use with works that are already free of known copyright restrictions throughout the world.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "References\n' 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http: // creativecommons.org / licenses / by / 4.0 / ).", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed10.pdf" - }, - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "To what subjects Creative Commons expand its work in 2023 ?", - "target_page": 8, - "target_passage": "We expanded our work in biodiversity, climate, and life sciences focused on ensuring that science research and data are open", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Creative Commons makes sharing easy", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "A Note from Leadership\nCC staff photos are licensed under CC BY 4.0.\n2023 was a busy year at Creative Commons. Our Open Culture program and Open Climate Campaign entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our Open Infrastructure Circle in an effort to ensure the CC Licenses are funded well into the future.\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC's permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on the critical work that awaits us in 2024 .", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "References\n' 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http: // creativecommons.org / licenses / by / 4.0 / ).", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed10.pdf" - }, - { - "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Open Culture\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from Arcadia . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and Open Culture Live: A Webinar Series . We invite you to read ' What did Creative Commons do for Open Culture in 2023? ' to learn more.", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "From which country does Killam Properties Inc originate ?", - "target_page": 3, - "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(i) Subsidiaries\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non-controlling interests represent the portion of profit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive Income and within equity in the Consolidated Statement of Financial Position, separately from shareholders' equity.\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements from the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not own more than 50% of the voting power.\nThe Company's significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following table:\nKillam Properties Inc., % Interest = 100%. Killam investments inc., % Interest = 100%. Killam investments (Pei) inc., % Interest = 100%. Killam Properties Apartments Trust, % Interest = 100%. Killam Properties M.H.C. Trust, % Interest = 100%. 661047 n.B. inc., % Interest = 100%. Blackshire court limited, % Interest = 100%. Blackshire court limited Partnership, % Interest = 95.92%. Killam KFH (180 mill st.) inc., % Interest = 100%. Killam KFH (Kanata lakes) inc., % Interest = 100%. Killam KFH (1355 silver spear road) inc., % Interest = 100%. Killam KFH sigma GP inc., % Interest = 50%. Killam KFH-Sigma Properties LP, % Interest = 25%\n70\nKillam ProPerties inc | 2013", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Business Overview\nIn addition, the Company owns MHCs, also known as land-lease communities or trailer parks. Killam owns the land and infrastructure supporting each community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities which accounted for 14% of Killam's NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the Company to crystallize the value of the properties at attractive cap-rates and use the funds to continue to grow the apartment portfolio.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about Killam properties inc.\nKillam Properties Inc. is a growth oriented Canadian real estate company. We own, manage and develop multi-family residential properties in Atlantic Canada and Ontario. Since our /first acquisition in 2002, our real estate portfolio has grown to $1.5 billion and includes 12,647 apartment units and 5,164 manufactured home community (MHC) sites. We are committed to growing Killam's earnings by maximizing the returns from our existing portfolio and expanding through acquisitions and development.", - "page_start": 2, - "page_end": 2, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Increased Supply Risk\nIncreased supply risk is the risk of loss from increased competition from the addition of new rental units in Killam's core markets. Numerous other residential developers and apartment owners compete for potential tenants. Although it is Killam's strategy to own multifamily residential properties in premier locations in each market in which it operates, some of the apartments or MHCs of Killam's competitors may be newer, better located or offer lower rents. An increase in alternative housing could have a material adverse effect on Killam's ability to lease units and in the rents charged and could adversely affect Killam's revenues and ability to meet its obligations. To mitigate against this risk Killam has a geographically diverse asset base. Management is expanding this diversification by increasing Killam's investment in apartment markets outside Atlantic Canada.", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Business Overview\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada's largest residential landlords, owning, operating, managing and developing multi-family residential and Manufactured Home Community ('MHC') properties. Killam's 164 apartment properties are located in Atlantic Canada's six largest urban centres and in Ontario. The Company's 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam's real estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and increasing FFo per share.\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic Canada and MHCs across Canada. Killam's first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, Killam's apartment portfolio grew through the acquisition of properties in Atlantic Canada's six largest cities, namely Halifax, Moncton, Saint John, Fredericton, St. John's and Charlottetown. Killam is now Atlantic Canada's largest residential landlord, with a 14.2% market share of the multi-family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the province, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions and developments. The apartment business is Killam's largest business segment, accounting for 86% of the Company's NOI from property operations and equity income in 2013. At December 31, 2013, Killam's apartment portfolio consisted of 12,647 units.\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development of four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect developments to exceed 5% of the total asset base in any given year.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Growth through Development\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed five properties to-date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, maximizes the use of excess land and eliminates the seller's profit, generating higher returns than through acquisitions. Management expects to limit development projects to approximately 5% of the balance sheet on an annual basis.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "The Multi-family Market Leader in Atlantic Canada\nAtlantic Canada is home to 2.3 million people, approximately 43% of whom live in the six largest cities, representing Killam's core markets in the region. Killam has a 14.2% market share of apartment units in these six largest centres. The chart below highlights the apartment NOI generated from each of the key urban markets in Atlantic Canada in 2013, and Killam's market share in each.\nKillam ProPerties inc | 2013 31", - "page_start": 30, - "page_end": 30, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "a Diversi/fied portfolio\nKillam has a diverse portfolio of both apartments and manufactured home communities. The apartment portfolio represents 86% of Killam's earnings and includes a variety of property types, such as high-rises, mid-rises and walk-ups, in nine urban centres across /five provinces. With a wide selection of properties and price points in each city, Killam caters to a broad tenant base. Killam's 35 manufactured home communities represent 14% of earnings and are located primarily in Nova Scotia and Ontario. The manufactured home communities complement the apartment business, providing stable and predictable cash /flows.", - "page_start": 12, - "page_end": 12, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "MHCs Compliment Killam's Apartment Portfolio\nWith MHCs, Killam owns the land and infrastructure supporting each community and leases the sites to the tenants, who own their own homes and pay Killam a monthly rent. In addition to site rent, the tenant may have a mortgage payment to a financial institution for their home. The average site rent in Killam's MHC portfolio was $222 per month, which offers value and affordability to tenants. The homeowner is responsible for property taxes based on the assessed value of their home and Killam is responsible for the property tax on the land.\nMHCs require less recurring capital investment and deliver a more predictable and stable cash flow than apartments. MHC home owners are responsible for the repair, maintenance and operating costs of their homes, which removes significant variable costs that are typically borne by Killam for apartments. The operating profit margin in Killam's MHC business averaged 62.4% over the last two years, compared to 58.9% for apartments.\nThe most significant costs to operate MHCs are water, land property tax and general repairs and maintenance to the water and sewer infrastructure. Killam's experience with MHCs has shown that the largest variable expenses are costs related to the water and sewer infrastructure. The majority of other costs have little variability. Killam's MHCs enjoy a stable tenant base, with consistently strong occupancy of approximately 98%. Should a tenant choose to leave a community, they sell their home, with the home typically remaining on the site and rent collection continuing uninterrupted from the new homeowner, who Killam approves as part of the sale process.\nKillam ProPerties inc | 2013 33", - "page_start": 32, - "page_end": 32, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "A Diversified Portfolio of Apartment Properties\nKillam's apartment portfolio includes a variety of property types, including high-rise (24% of units), mid-rise with elevators (33%) , walk-ups (41%) and a small number of townhouses (2%). The portfolio includes rents ranging from affordable to high-end Class A properties. The average rent for Killam's apartment units at the end of 2013 was $915.\nThe average age of Killam's apartment portfolio is 28 years. With a focus on both developing and acquiring newer properties, 23% of Killam's apartments are considered new (built after 2001), on a unit count basis. Compared to the national average of 7%, as per CMHC's 2010 Housing Observer, Killam's portfolio is considerably newer and should result in lower capital and maintenance costs for the foreseeable future. 43% of Killam's noi is generated from apartment units that are considered new, with 20% of the company's noi generated from units built in the last five years.", - "page_start": 32, - "page_end": 32, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "How Killam Properties Inc does increase its geographic diversification ? ", - "target_page": 5, - "target_passage": "We are increasing our geographic diversification by expanding our apartment ownership outside Atlantic Canada. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Geographic Diversification\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, Killam is the region's largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is between 15%-18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam's growth opportunities increase significantly when considering assets outside Atlantic Canada.\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building a portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in Ontario, and potentially Western Canada, will increase the Company's diversification and exposure in high growth centres in Canada. Based on the Company's portfolio at year-end, 15% of Killam's 2014 NOI will be generated in Ontario. Management has set a long-term target of growing the amount of NOI generated outside of Atlantic Canada to 50%.\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive cap-rates. This creates moderate short-term dilution but it provides the Company with funds to continue its geographic diversification by accretively growing its apartment portfolio in Ontario.\nKillam ProPerties inc | 2013 29", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Increased Supply Risk\nIncreased supply risk is the risk of loss from increased competition from the addition of new rental units in Killam's core markets. Numerous other residential developers and apartment owners compete for potential tenants. Although it is Killam's strategy to own multifamily residential properties in premier locations in each market in which it operates, some of the apartments or MHCs of Killam's competitors may be newer, better located or offer lower rents. An increase in alternative housing could have a material adverse effect on Killam's ability to lease units and in the rents charged and could adversely affect Killam's revenues and ability to meet its obligations. To mitigate against this risk Killam has a geographically diverse asset base. Management is expanding this diversification by increasing Killam's investment in apartment markets outside Atlantic Canada.", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about Killam properties inc.\nKillam Properties Inc. is a growth oriented Canadian real estate company. We own, manage and develop multi-family residential properties in Atlantic Canada and Ontario. Since our /first acquisition in 2002, our real estate portfolio has grown to $1.5 billion and includes 12,647 apartment units and 5,164 manufactured home community (MHC) sites. We are committed to growing Killam's earnings by maximizing the returns from our existing portfolio and expanding through acquisitions and development.", - "page_start": 2, - "page_end": 2, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Growth through Development\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed five properties to-date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, maximizes the use of excess land and eliminates the seller's profit, generating higher returns than through acquisitions. Management expects to limit development projects to approximately 5% of the balance sheet on an annual basis.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "(i) Subsidiaries\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non-controlling interests represent the portion of profit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive Income and within equity in the Consolidated Statement of Financial Position, separately from shareholders' equity.\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements from the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not own more than 50% of the voting power.\nThe Company's significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following table:\nKillam Properties Inc., % Interest = 100%. Killam investments inc., % Interest = 100%. Killam investments (Pei) inc., % Interest = 100%. Killam Properties Apartments Trust, % Interest = 100%. Killam Properties M.H.C. Trust, % Interest = 100%. 661047 n.B. inc., % Interest = 100%. Blackshire court limited, % Interest = 100%. Blackshire court limited Partnership, % Interest = 95.92%. Killam KFH (180 mill st.) inc., % Interest = 100%. Killam KFH (Kanata lakes) inc., % Interest = 100%. Killam KFH (1355 silver spear road) inc., % Interest = 100%. Killam KFH sigma GP inc., % Interest = 50%. Killam KFH-Sigma Properties LP, % Interest = 25%\n70\nKillam ProPerties inc | 2013", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Business Overview\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada's largest residential landlords, owning, operating, managing and developing multi-family residential and Manufactured Home Community ('MHC') properties. Killam's 164 apartment properties are located in Atlantic Canada's six largest urban centres and in Ontario. The Company's 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam's real estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and increasing FFo per share.\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic Canada and MHCs across Canada. Killam's first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, Killam's apartment portfolio grew through the acquisition of properties in Atlantic Canada's six largest cities, namely Halifax, Moncton, Saint John, Fredericton, St. John's and Charlottetown. Killam is now Atlantic Canada's largest residential landlord, with a 14.2% market share of the multi-family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the province, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions and developments. The apartment business is Killam's largest business segment, accounting for 86% of the Company's NOI from property operations and equity income in 2013. At December 31, 2013, Killam's apartment portfolio consisted of 12,647 units.\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development of four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect developments to exceed 5% of the total asset base in any given year.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Business Overview\nIn addition, the Company owns MHCs, also known as land-lease communities or trailer parks. Killam owns the land and infrastructure supporting each community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities which accounted for 14% of Killam's NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the Company to crystallize the value of the properties at attractive cap-rates and use the funds to continue to grow the apartment portfolio.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Expanding Ownership in Ontario\nKillam's apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa, Toronto, London and Cambridge. In addition to apartments, 42% of Killam's MHC sites are located in Ontario. Killam is focused on increasing its geographic diversification by acquiring more properties in Ontario.", - "page_start": 32, - "page_end": 32, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "The Multi-family Market Leader in Atlantic Canada\nAtlantic Canada is home to 2.3 million people, approximately 43% of whom live in the six largest cities, representing Killam's core markets in the region. Killam has a 14.2% market share of apartment units in these six largest centres. The chart below highlights the apartment NOI generated from each of the key urban markets in Atlantic Canada in 2013, and Killam's market share in each.\nKillam ProPerties inc | 2013 31", - "page_start": 30, - "page_end": 30, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Dear Shareholders,\nI am pleased to review Killam's 2013 performance with you, and outline our strategy and plans for the future. We are progressing nicely with our priorities to increase the quality of our portfolio and expand geographically. In addition, we are focused on three key areas of growth for the Company: increase the value of our existing portfolio, acquire accretively and develop pro/fitably.\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam community with the introduction of Killam's Core Values. These values have been inherent in the Company since our /first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values (Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions)\nare represented in the colourful squares you will see throughout this year's report. Killam employees across the Company demonstrate these values in their daily work, distinguishing Killam as a high-quality landlord. The introduction of a quarterly awards program, which recognizes employees who exemplify Killam's\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality of nominations. We truly have a remarkable group of employees who go above and beyond in providing exceptional service to our tenants.", - "page_start": 8, - "page_end": 8, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "What is the Killam Properties Inc 2013 performance about the Geographic Diversification objective ?", - "target_page": 8, - "target_passage": "Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Geographic Diversification\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, Killam is the region's largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is between 15%-18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam's growth opportunities increase significantly when considering assets outside Atlantic Canada.\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building a portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in Ontario, and potentially Western Canada, will increase the Company's diversification and exposure in high growth centres in Canada. Based on the Company's portfolio at year-end, 15% of Killam's 2014 NOI will be generated in Ontario. Management has set a long-term target of growing the amount of NOI generated outside of Atlantic Canada to 50%.\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive cap-rates. This creates moderate short-term dilution but it provides the Company with funds to continue its geographic diversification by accretively growing its apartment portfolio in Ontario.\nKillam ProPerties inc | 2013 29", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Increased Supply Risk\nIncreased supply risk is the risk of loss from increased competition from the addition of new rental units in Killam's core markets. Numerous other residential developers and apartment owners compete for potential tenants. Although it is Killam's strategy to own multifamily residential properties in premier locations in each market in which it operates, some of the apartments or MHCs of Killam's competitors may be newer, better located or offer lower rents. An increase in alternative housing could have a material adverse effect on Killam's ability to lease units and in the rents charged and could adversely affect Killam's revenues and ability to meet its obligations. To mitigate against this risk Killam has a geographically diverse asset base. Management is expanding this diversification by increasing Killam's investment in apartment markets outside Atlantic Canada.", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about Killam properties inc.\nKillam Properties Inc. is a growth oriented Canadian real estate company. We own, manage and develop multi-family residential properties in Atlantic Canada and Ontario. Since our /first acquisition in 2002, our real estate portfolio has grown to $1.5 billion and includes 12,647 apartment units and 5,164 manufactured home community (MHC) sites. We are committed to growing Killam's earnings by maximizing the returns from our existing portfolio and expanding through acquisitions and development.", - "page_start": 2, - "page_end": 2, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Capital Improvements\nKillam invests capital to maintain and improve the operating performance of its properties. During the year ended December 31, 2013, Killam invested a total of $21.6 million in its portfolio, compared to $22.5 million in 2012.", - "page_start": 49, - "page_end": 49, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Growth through Development\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed five properties to-date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, maximizes the use of excess land and eliminates the seller's profit, generating higher returns than through acquisitions. Management expects to limit development projects to approximately 5% of the balance sheet on an annual basis.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Business Overview\nIn addition, the Company owns MHCs, also known as land-lease communities or trailer parks. Killam owns the land and infrastructure supporting each community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities which accounted for 14% of Killam's NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the Company to crystallize the value of the properties at attractive cap-rates and use the funds to continue to grow the apartment portfolio.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Business Overview\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada's largest residential landlords, owning, operating, managing and developing multi-family residential and Manufactured Home Community ('MHC') properties. Killam's 164 apartment properties are located in Atlantic Canada's six largest urban centres and in Ontario. The Company's 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam's real estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and increasing FFo per share.\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic Canada and MHCs across Canada. Killam's first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, Killam's apartment portfolio grew through the acquisition of properties in Atlantic Canada's six largest cities, namely Halifax, Moncton, Saint John, Fredericton, St. John's and Charlottetown. Killam is now Atlantic Canada's largest residential landlord, with a 14.2% market share of the multi-family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the province, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions and developments. The apartment business is Killam's largest business segment, accounting for 86% of the Company's NOI from property operations and equity income in 2013. At December 31, 2013, Killam's apartment portfolio consisted of 12,647 units.\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development of four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect developments to exceed 5% of the total asset base in any given year.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "(i) Subsidiaries\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non-controlling interests represent the portion of profit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive Income and within equity in the Consolidated Statement of Financial Position, separately from shareholders' equity.\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements from the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not own more than 50% of the voting power.\nThe Company's significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following table:\nKillam Properties Inc., % Interest = 100%. Killam investments inc., % Interest = 100%. Killam investments (Pei) inc., % Interest = 100%. Killam Properties Apartments Trust, % Interest = 100%. Killam Properties M.H.C. Trust, % Interest = 100%. 661047 n.B. inc., % Interest = 100%. Blackshire court limited, % Interest = 100%. Blackshire court limited Partnership, % Interest = 95.92%. Killam KFH (180 mill st.) inc., % Interest = 100%. Killam KFH (Kanata lakes) inc., % Interest = 100%. Killam KFH (1355 silver spear road) inc., % Interest = 100%. Killam KFH sigma GP inc., % Interest = 50%. Killam KFH-Sigma Properties LP, % Interest = 25%\n70\nKillam ProPerties inc | 2013", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Dear Shareholders,\nI am pleased to review Killam's 2013 performance with you, and outline our strategy and plans for the future. We are progressing nicely with our priorities to increase the quality of our portfolio and expand geographically. In addition, we are focused on three key areas of growth for the Company: increase the value of our existing portfolio, acquire accretively and develop pro/fitably.\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam community with the introduction of Killam's Core Values. These values have been inherent in the Company since our /first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values (Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions)\nare represented in the colourful squares you will see throughout this year's report. Killam employees across the Company demonstrate these values in their daily work, distinguishing Killam as a high-quality landlord. The introduction of a quarterly awards program, which recognizes employees who exemplify Killam's\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality of nominations. We truly have a remarkable group of employees who go above and beyond in providing exceptional service to our tenants.", - "page_start": 8, - "page_end": 8, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Continuity of Investment Properties\nThe following table summarizes the changes in value of Killam's investment properties for the years ended December 31, 2013, and 2012.", - "page_start": 46, - "page_end": 46, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "What is the conventional workflow for BERT ?", - "target_page": 1, - "target_passage": "The conventional workflow for BERT consists of two stages: pre-training and fine-tuning. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "5 Training BERT\nThis section reviews the proposals to optimize the training and architecture of the original BERT.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\nBERT-base (Devlin et al., 2019), Compression Performance Speedup = × 1. BERT-base (Devlin et al., 2019), = 100%. BERT-base (Devlin et al., 2019), = × 1. BERT-base (Devlin et al., 2019), Model = BERT12. BERT-base (Devlin et al., 2019), Evaluation = All GLUE tasks, SQuAD. BERT-small, Compression Performance Speedup = × 3.8. BERT-small, = 91%. BERT-small, = -. BERT-small, Model = BERT4 †. BERT-small, Evaluation = All GLUE tasks. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Compression Performance Speedup = × 1.5 × 1.6. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), = 90% § 98%. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.3 World knowledge\nThe bulk of evidence about commonsense knowledge captured in BERT comes from practitioners using it to extract such knowledge. One direct probing study of BERT reports that BERT struggles with pragmatic inference and role-based event knowledge (Ettinger, 2019). BERT also struggles with abstract attributes of objects, as well as visual and perceptual properties that are likely to be assumed rather than mentioned (Da and Kasai, 2019).\nThe MLM component of BERT is easy to adapt for knowledge induction by filling in the\nKG\nDante\nborn-in\nFlorence\nFigure 1:\nQuerying knowledge bases (KB) and lan-\nguage models (LM) for factual knowledge. Figure 2: BERT world knowledge (Petroni et al., 2019)\nvast amounts of linguistic knowledge (Peters et al., 2018b; Goldberg, 2019; Tenney et al., 2019) useful for downstream tasks. This knowledge is usually accessed either by conditioning on latent context representations produced by the original model or by using the original model weights to initialize a task-specific model which is then further fine-tuned. This type of knowledge transfer is crucial for current state-of-the-art results on a wide range of tasks. In contrast, knowledge bases are e ective soblanks (e.g. \"Cats like to chase [___]\"). Petroni et al. (2019) showed that, for some relation types, vanilla BERT is competitive with methods relying on knowledge bases (Figure 2), and Roberts et al. (2020) show the same for open-domain QA using T5 model (Raffel et al., 2019). Davison et al. (2019) suggest that it generalizes better to unseen data. In order to retrieve BERT's knowledge, we need good template sentences, and there is work on their automatic extraction and augmentation (Bouraoui et al., 2019; Jiang et al., 2019b).", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5.3 Pre-training BERT\nAlthough BERT is already actively used as a source of world knowledge (see subsection 3.3), there is also work on explicitly supplying structured knowledge . One approach is entityenhanced models. For example, Peters et al. (2019a); Zhang et al. (2019) include entity em-\nFigure 5: Pre-trained weights help BERT find wider optima in fine-tuning on MRPC (right) than training from scratch (left) (Hao et al., 2019)\nbeddings as input for training BERT, while Poerner et al. (2019) adapt entity vectors to BERT representations. As mentioned above, Wang et al. (2020c) integrate knowledge not through entity embeddings, but through additional pre-training objective of knowledge base completion. Sun et al. (2019b,c) modify the standard MLM task to mask named entities rather than random words, and Yin et al. (2020) train with MLM objective over both text and linearized table data. Wang et al. (2020a) enhance RoBERTa with both linguistic and factual knowledge with task-specific adapters.\nPre-training is the most expensive part of training BERT, and it would be informative to know how much benefit it provides. On some tasks, a randomly initialized and fine-tuned BERT obtains competitive or higher results than the pre-trained BERT with the task classifier and frozen weights (Kovaleva et al., 2019). The consensus in the community is that pre-training does help in most situations, but the degree and its exact contribution requires further investigation. Prasanna et al. (2020) found that most weights of pre-trained BERT are useful in fine-tuning, although there are \"better\" and \"worse\" subnetworks. One explanation is that pre-trained weights help the fine-tuned BERT find wider and flatter areas with smaller generalization error, which makes the model more robust to overfitting (see Figure 5 from Hao et al. (2019)).\nGiven the large number and variety of proposed modifications, one would wish to know how much impact each of them has. However, due to the overall trend towards large model sizes, systematic ablations have become expensive. Most new models claim superiority on standard benchmarks, but gains are often marginal, and estimates of model stability and significance testing are very rare.", - "page_start": 7, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.2 Semantic knowledge knowledge bases: they require no schema en-\nTo date, more studies have been devoted to BERT's knowledge of syntactic rather than semantic phenomena. However, we do have evidence from an MLMprobing study that BERT has some knowledge of semantic roles (Ettinger, 2019). BERT even displays some preference for the incorrect fillers for semantic roles that are semantically related to the correct ones, as opposed to those that are unrelated (e.g. \"to tip a chef\" is better than \"to tip a robin\", but worse than \"to tip a waiter\"). gineering, allow practitioners to query about an open class of relations, are easy to extend to more data, and require no human supervision to train. We present an in-depth analysis of the relational knowledge already present (without fine-tuning) in a wide range of state-of-theart pretrained language models. We find that (i) without fine-tuning, BERT contains relational knowledge competitive with traditional NLP methods that have some access to oracle knowledge, (ii) BERT also does remarkably well on open-domain question answer-\nBERTstruggles with representations of numbers. Addition and number decoding tasks showed that BERT does not form good representations for floating point numbers and fails to generalize away from the training data (Wallace et al., 2019b). A part of the problem is BERT's wordpiece tokenization, since numbers of similar values can be divided up into substantially different word chunks. call factual knowledge without any fine-tuning demonstrates their potential as unsupervised open-domain QA systems. The code to reproduce our analysis is available at https: //github.com/facebookresearch/LAMA . 1 Introduction Recently, pretrained high-capacity language models such as ELMo (Peters et al., 2018a) and BERT\nTenney et al. (2019b) showed that BERT encodes information about entity types, relations, semantic roles, and proto-roles , since this information can be detected with probing classifiers. ing against a supervised baseline, and (iii) certain types of factual knowledge are learned much more readily than others by standard language model pretraining approaches. The surprisingly strong ability of these models to re-", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= 99%. PoWER-BERT (Goyal et al., 2020), = × 2-4.5. PoWER-BERT (Goyal et al., 2020), Model = BERT12. PoWER-BERT (Goyal et al., 2020), Evaluation = No WNLI; RACE. , Compression Performance Speedup = N/A. , = . , = . , Model = . , Evaluation = ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3 What knowledge does BERT have?\nA number of studies have looked at the knowledge encoded in BERT weights. The popular approaches include fill-in-the-gap probes of MLM, analysis of self-attention weights, and probing classifiers with different BERT representations as inputs.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "1 Introduction\nSince their introduction in 2017, Transformers (Vaswani et al., 2017) have taken NLP by storm, offering enhanced parallelization and better modeling of long-range dependencies. The best known Transformer-based model is BERT (Devlin et al., 2019); it obtained state-of-the-art results in numerous benchmarks and is still a must-have baseline.\nWhile it is clear that BERT works remarkably well, it is less clear why , which limits further hypothesis-driven improvement of the architecture. Unlike CNNs, the Transformers have little cognitive motivation, and the size of these models limits our ability to experiment with pre-training and perform ablation studies. This explains a large number of studies over the past year that attempted to understand the reasons behind BERT's performance.\nIn this paper, we provide an overview of what has been learned to date, highlighting the questions which are still unresolved. We first consider the linguistic aspects of it, i.e., the current evidence regarding the types of linguistic and world knowledge learned by BERT, as well as where and how this knowledge may be stored in the model. We then turn to the technical aspects of the model and provide an overview of the current proposals to", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= × 1.6 × 1.9. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Model = BERT6 BERT6. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Evaluation = All GLUE tasks, SQuAD No WNLI, CoLA, STS-B; RACE. BERT3-PKD (Sun et al., 2019a), Compression Performance Speedup = × 2.4. BERT3-PKD (Sun et al., 2019a), = 92%. BERT3-PKD (Sun et al., 2019a), = × 3.7. BERT3-PKD (Sun et al., 2019a), Model = BERT3. BERT3-PKD (Sun et al., 2019a), Evaluation = No WNLI, CoLA, STS-B; RACE. Aguilar et al. (2019), Exp. 3, Compression Performance Speedup = × 1.6. Aguilar et al. (2019), Exp. 3, = 93%. Aguilar et al. (2019), Exp. 3, = -. Aguilar et al. (2019), Exp. 3, Model = BERT6. Aguilar et al. (2019), Exp. 3, Evaluation = CoLA, MRPC, QQP, RTE. , Compression Performance Speedup = . , = 87%. , = . , Model = . , Evaluation = . BERT-48 (Zhao et al., 2019), Compression Performance Speedup = × 62. BERT-48 (Zhao et al., 2019),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.1 Overparameterization\nIn general, larger BERT models perform better (Liu et al., 2019a; Roberts et al., 2020), but not always: BERT-base outperformed BERT-large on subject-verb agreement (Goldberg, 2019) and sentence subject detection (Lin et al., 2019). Given the complexity of language, and amounts of pretraining data, it is not clear why BERT ends up with redundant heads and layers. Clark et al. (2019) suggest that one possible reason is the use of attention dropouts, which causes some attention weights to be zeroed-out during training.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "Is syntaxis encoded with Bert model ?", - "target_page": 2, - "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "5.3 Pre-training BERT\nAlthough BERT is already actively used as a source of world knowledge (see subsection 3.3), there is also work on explicitly supplying structured knowledge . One approach is entityenhanced models. For example, Peters et al. (2019a); Zhang et al. (2019) include entity em-\nFigure 5: Pre-trained weights help BERT find wider optima in fine-tuning on MRPC (right) than training from scratch (left) (Hao et al., 2019)\nbeddings as input for training BERT, while Poerner et al. (2019) adapt entity vectors to BERT representations. As mentioned above, Wang et al. (2020c) integrate knowledge not through entity embeddings, but through additional pre-training objective of knowledge base completion. Sun et al. (2019b,c) modify the standard MLM task to mask named entities rather than random words, and Yin et al. (2020) train with MLM objective over both text and linearized table data. Wang et al. (2020a) enhance RoBERTa with both linguistic and factual knowledge with task-specific adapters.\nPre-training is the most expensive part of training BERT, and it would be informative to know how much benefit it provides. On some tasks, a randomly initialized and fine-tuned BERT obtains competitive or higher results than the pre-trained BERT with the task classifier and frozen weights (Kovaleva et al., 2019). The consensus in the community is that pre-training does help in most situations, but the degree and its exact contribution requires further investigation. Prasanna et al. (2020) found that most weights of pre-trained BERT are useful in fine-tuning, although there are \"better\" and \"worse\" subnetworks. One explanation is that pre-trained weights help the fine-tuned BERT find wider and flatter areas with smaller generalization error, which makes the model more robust to overfitting (see Figure 5 from Hao et al. (2019)).\nGiven the large number and variety of proposed modifications, one would wish to know how much impact each of them has. However, due to the overall trend towards large model sizes, systematic ablations have become expensive. Most new models claim superiority on standard benchmarks, but gains are often marginal, and estimates of model stability and significance testing are very rare.", - "page_start": 7, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\nBERT-base (Devlin et al., 2019), Compression Performance Speedup = × 1. BERT-base (Devlin et al., 2019), = 100%. BERT-base (Devlin et al., 2019), = × 1. BERT-base (Devlin et al., 2019), Model = BERT12. BERT-base (Devlin et al., 2019), Evaluation = All GLUE tasks, SQuAD. BERT-small, Compression Performance Speedup = × 3.8. BERT-small, = 91%. BERT-small, = -. BERT-small, Model = BERT4 †. BERT-small, Evaluation = All GLUE tasks. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Compression Performance Speedup = × 1.5 × 1.6. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), = 90% § 98%. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.2 Semantic knowledge knowledge bases: they require no schema en-\nTo date, more studies have been devoted to BERT's knowledge of syntactic rather than semantic phenomena. However, we do have evidence from an MLMprobing study that BERT has some knowledge of semantic roles (Ettinger, 2019). BERT even displays some preference for the incorrect fillers for semantic roles that are semantically related to the correct ones, as opposed to those that are unrelated (e.g. \"to tip a chef\" is better than \"to tip a robin\", but worse than \"to tip a waiter\"). gineering, allow practitioners to query about an open class of relations, are easy to extend to more data, and require no human supervision to train. We present an in-depth analysis of the relational knowledge already present (without fine-tuning) in a wide range of state-of-theart pretrained language models. We find that (i) without fine-tuning, BERT contains relational knowledge competitive with traditional NLP methods that have some access to oracle knowledge, (ii) BERT also does remarkably well on open-domain question answer-\nBERTstruggles with representations of numbers. Addition and number decoding tasks showed that BERT does not form good representations for floating point numbers and fails to generalize away from the training data (Wallace et al., 2019b). A part of the problem is BERT's wordpiece tokenization, since numbers of similar values can be divided up into substantially different word chunks. call factual knowledge without any fine-tuning demonstrates their potential as unsupervised open-domain QA systems. The code to reproduce our analysis is available at https: //github.com/facebookresearch/LAMA . 1 Introduction Recently, pretrained high-capacity language models such as ELMo (Peters et al., 2018a) and BERT\nTenney et al. (2019b) showed that BERT encodes information about entity types, relations, semantic roles, and proto-roles , since this information can be detected with probing classifiers. ing against a supervised baseline, and (iii) certain types of factual knowledge are learned much more readily than others by standard language model pretraining approaches. The surprisingly strong ability of these models to re-", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= 99%. PoWER-BERT (Goyal et al., 2020), = × 2-4.5. PoWER-BERT (Goyal et al., 2020), Model = BERT12. PoWER-BERT (Goyal et al., 2020), Evaluation = No WNLI; RACE. , Compression Performance Speedup = N/A. , = . , = . , Model = . , Evaluation = ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3 What knowledge does BERT have?\nA number of studies have looked at the knowledge encoded in BERT weights. The popular approaches include fill-in-the-gap probes of MLM, analysis of self-attention weights, and probing classifiers with different BERT representations as inputs.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= × 1.6 × 1.9. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Model = BERT6 BERT6. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Evaluation = All GLUE tasks, SQuAD No WNLI, CoLA, STS-B; RACE. BERT3-PKD (Sun et al., 2019a), Compression Performance Speedup = × 2.4. BERT3-PKD (Sun et al., 2019a), = 92%. BERT3-PKD (Sun et al., 2019a), = × 3.7. BERT3-PKD (Sun et al., 2019a), Model = BERT3. BERT3-PKD (Sun et al., 2019a), Evaluation = No WNLI, CoLA, STS-B; RACE. Aguilar et al. (2019), Exp. 3, Compression Performance Speedup = × 1.6. Aguilar et al. (2019), Exp. 3, = 93%. Aguilar et al. (2019), Exp. 3, = -. Aguilar et al. (2019), Exp. 3, Model = BERT6. Aguilar et al. (2019), Exp. 3, Evaluation = CoLA, MRPC, QQP, RTE. , Compression Performance Speedup = . , = 87%. , = . , Model = . , Evaluation = . BERT-48 (Zhao et al., 2019), Compression Performance Speedup = × 62. BERT-48 (Zhao et al., 2019),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "2 Overview of BERT architecture\nFundamentally, BERT is a stack of Transformer encoder layers (Vaswani et al., 2017) which consist of multiple self-attention \"heads\". For every input token in a sequence, each head computes key, value and query vectors, used to create a weighted representation. The outputs of all heads in the same layer are combined and run through a fully-connected layer. Each layer is wrapped with a skip connection and followed by layer normalization.\nThe conventional workflow for BERT consists of two stages: pre-training and fine-tuning. Pretraining uses two self-supervised tasks: masked language modeling (MLM, prediction of randomly masked input tokens) and next sentence prediction (NSP, predicting if two input sentences are adjacent to each other). In fine-tuning for downstream applications, one or more fully-connected layers are typically added on top of the final encoder layer.\nThe input representations are computed as follows: each word in the input is first tokenized into wordpieces (Wu et al., 2016), and then three embedding layers (token, position, and segment) are combined to obtain a fixed-length vector. Special token [CLS] is used for classification predictions, and [SEP] separates input segments.\nGoogle 1 and HuggingFace (Wolf et al., 2020) provide many variants of BERT, including the original \"base\" and \"large\" versions. They vary in the number of heads, layers, and hidden state size.\n1 https://github.com/\ngoogle-research/bert", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= . BERT-48 (Zhao et al., 2019), = × 77. BERT-48 (Zhao et al., 2019), Model = BERT12 ∗†. BERT-48 (Zhao et al., 2019), Evaluation = MNLI, MRPC, SST-2. BERT-192 (Zhao et al., 2019), Compression Performance Speedup = × 5.7. BERT-192 (Zhao et al., 2019), = 93%. BERT-192 (Zhao et al., 2019), = × 22. BERT-192 (Zhao et al., 2019), Model = BERT12 ∗†. BERT-192 (Zhao et al., 2019), Evaluation = MNLI, MRPC, SST-2. Distillation TinyBERT (Jiao et al., 2019), Compression Performance Speedup = × 7.5. Distillation TinyBERT (Jiao et al., 2019), = 96%. Distillation TinyBERT (Jiao et al., 2019), = × 9.4. Distillation TinyBERT (Jiao et al., 2019), Model = BERT4 †. Distillation TinyBERT (Jiao et al., 2019), Evaluation = No WNLI; SQuAD. MobileBERT (Sun et al., 2020), Compression Performance Speedup = × 4.3. MobileBERT (Sun et al., 2020), = 100%. MobileBERT (Sun et al., 2020),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "4.3 BERT layers\nlevel LSTM la\ntraining task-s\ntuned a bit mo\nately task spe\nthe LSTM alr\ntures, and may\n6\nTransfer\nSuccessful pr\nself-supervise\nguage modelin\ntence predicti\nable the use\nHowever, con\non explicitly\npretrained\nsen\nneau et al., 2\nthe choice of\ntic knowledge\nwe compare\nexplicitly-supe\nguage model p\nlayers are more transferable (Liu et al., 2019a). In fine-tuning, it explains why the final layers change the most (Kovaleva et al., 2019), and why restoring the weights of lower layers of fine-tuned BERT to their original values does not dramatically hurt the model performance (Hao et al., 2019).\nTenney et al. (2019a) suggest that while syntactic information appears early in the model and can be localized, semantics is spread across the entire model , which explains why certain non-trivial examples get solved incorrectly at first but correctly at the later layers. This is rather to be expected: semantics permeates all language, and linguists debate whether meaningless structures can exist at all (Goldberg, 2006, p.166-182). But this raises the question of what stacking more Transformer layers in BERT actually achieves in terms of the spread of semantic knowledge, and whether that is beneficial. Tenney et al. compared BERT-base and BERT-large, and found that the overall pattern of cumulative score gains is the same, only more spread out in the larger model.\nNote that Tenney et al. (2019a)'s experiments concern sentence-level semantic relations; Cui et al. (2020) report that the encoding of ConceptNet semantic relations is the worst in the early layers and increases towards the top. Jawahar et al. (2019) place \"surface features in lower layers, syntactic features in middle layers and semantic features in higher layers\", but their conclusion is surprising, given that only one semantic task in this study actually topped at the last layer, and three others peaked around the middle and then considerably degraded by the final layers.", - "page_start": 5, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "2 BACKGROUND\nA number of these models also have multilingual variants such as mBERT [39] and mT5 [148] or are trained with some amount of multilingual data such as GPT-3 where 7% of the training data was not in English [25]. The performance of these multilingual models across languages is an active area of research. Wu and Drezde [144] found that while mBERT does not perform equally well across all 104 languages in its training data, it performed better at NER, POS tagging, and dependency parsing than monolingual models trained with comparable amounts of data for four low-resource languages. Conversely, [95] surveyed monolingual BERT models developed with more specific architecture considerations or additional monolingual data and found that they generally outperform\n1 https://www.microsoft.com/en-us/research/blog/turing-nlg-a-17-billion-parameterlanguage-model-by-microsoft/\n611\nStochastic Parrots\nFAccT '21, March 3-10, 2021, Virtual Event, Canada\nmBERT across 29 tasks. Either way, these models do not address the inclusion problems raised by [65], who note that over 90% of the world's languages used by more than a billion people currently have little to no support in terms of language technology.\nAlongside work investigating what information the models retain from the data, we see a trend in reducing the size of these models using various techniques such as knowledge distillation [26, 58], quantization [118, 153], factorized embedding parameterization and cross-layer parameter sharing [70], and progressive module replacing [146]. Rogers et al. [110] provide a comprehensive comparison of models derived from BERT using these techniques, such as DistilBERT [113] and ALBERT [70]. While these models maintain and sometimes exceed the performance of the original BERT model, despite their much smaller size, they ultimately still rely on large quantities of data and significant processing and storage capabilities to both hold and reduce the model.", - "page_start": 1, - "page_end": 2, - "source_file": "arxiv5_ccby4license.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "Is BERT good with numbers representations ?", - "target_page": 3, - "target_passage": " BERTstruggles with representations of numbers. ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "3 What knowledge does BERT have?\nA number of studies have looked at the knowledge encoded in BERT weights. The popular approaches include fill-in-the-gap probes of MLM, analysis of self-attention weights, and probing classifiers with different BERT representations as inputs.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\nBERT-base (Devlin et al., 2019), Compression Performance Speedup = × 1. BERT-base (Devlin et al., 2019), = 100%. BERT-base (Devlin et al., 2019), = × 1. BERT-base (Devlin et al., 2019), Model = BERT12. BERT-base (Devlin et al., 2019), Evaluation = All GLUE tasks, SQuAD. BERT-small, Compression Performance Speedup = × 3.8. BERT-small, = 91%. BERT-small, = -. BERT-small, Model = BERT4 †. BERT-small, Evaluation = All GLUE tasks. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Compression Performance Speedup = × 1.5 × 1.6. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), = 90% § 98%. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.2 Semantic knowledge knowledge bases: they require no schema en-\nTo date, more studies have been devoted to BERT's knowledge of syntactic rather than semantic phenomena. However, we do have evidence from an MLMprobing study that BERT has some knowledge of semantic roles (Ettinger, 2019). BERT even displays some preference for the incorrect fillers for semantic roles that are semantically related to the correct ones, as opposed to those that are unrelated (e.g. \"to tip a chef\" is better than \"to tip a robin\", but worse than \"to tip a waiter\"). gineering, allow practitioners to query about an open class of relations, are easy to extend to more data, and require no human supervision to train. We present an in-depth analysis of the relational knowledge already present (without fine-tuning) in a wide range of state-of-theart pretrained language models. We find that (i) without fine-tuning, BERT contains relational knowledge competitive with traditional NLP methods that have some access to oracle knowledge, (ii) BERT also does remarkably well on open-domain question answer-\nBERTstruggles with representations of numbers. Addition and number decoding tasks showed that BERT does not form good representations for floating point numbers and fails to generalize away from the training data (Wallace et al., 2019b). A part of the problem is BERT's wordpiece tokenization, since numbers of similar values can be divided up into substantially different word chunks. call factual knowledge without any fine-tuning demonstrates their potential as unsupervised open-domain QA systems. The code to reproduce our analysis is available at https: //github.com/facebookresearch/LAMA . 1 Introduction Recently, pretrained high-capacity language models such as ELMo (Peters et al., 2018a) and BERT\nTenney et al. (2019b) showed that BERT encodes information about entity types, relations, semantic roles, and proto-roles , since this information can be detected with probing classifiers. ing against a supervised baseline, and (iii) certain types of factual knowledge are learned much more readily than others by standard language model pretraining approaches. The surprisingly strong ability of these models to re-", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5 Training BERT\nThis section reviews the proposals to optimize the training and architecture of the original BERT.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= 99%. PoWER-BERT (Goyal et al., 2020), = × 2-4.5. PoWER-BERT (Goyal et al., 2020), Model = BERT12. PoWER-BERT (Goyal et al., 2020), Evaluation = No WNLI; RACE. , Compression Performance Speedup = N/A. , = . , = . , Model = . , Evaluation = ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5.3 Pre-training BERT\nAlthough BERT is already actively used as a source of world knowledge (see subsection 3.3), there is also work on explicitly supplying structured knowledge . One approach is entityenhanced models. For example, Peters et al. (2019a); Zhang et al. (2019) include entity em-\nFigure 5: Pre-trained weights help BERT find wider optima in fine-tuning on MRPC (right) than training from scratch (left) (Hao et al., 2019)\nbeddings as input for training BERT, while Poerner et al. (2019) adapt entity vectors to BERT representations. As mentioned above, Wang et al. (2020c) integrate knowledge not through entity embeddings, but through additional pre-training objective of knowledge base completion. Sun et al. (2019b,c) modify the standard MLM task to mask named entities rather than random words, and Yin et al. (2020) train with MLM objective over both text and linearized table data. Wang et al. (2020a) enhance RoBERTa with both linguistic and factual knowledge with task-specific adapters.\nPre-training is the most expensive part of training BERT, and it would be informative to know how much benefit it provides. On some tasks, a randomly initialized and fine-tuned BERT obtains competitive or higher results than the pre-trained BERT with the task classifier and frozen weights (Kovaleva et al., 2019). The consensus in the community is that pre-training does help in most situations, but the degree and its exact contribution requires further investigation. Prasanna et al. (2020) found that most weights of pre-trained BERT are useful in fine-tuning, although there are \"better\" and \"worse\" subnetworks. One explanation is that pre-trained weights help the fine-tuned BERT find wider and flatter areas with smaller generalization error, which makes the model more robust to overfitting (see Figure 5 from Hao et al. (2019)).\nGiven the large number and variety of proposed modifications, one would wish to know how much impact each of them has. However, due to the overall trend towards large model sizes, systematic ablations have become expensive. Most new models claim superiority on standard benchmarks, but gains are often marginal, and estimates of model stability and significance testing are very rare.", - "page_start": 7, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= . BERT-48 (Zhao et al., 2019), = × 77. BERT-48 (Zhao et al., 2019), Model = BERT12 ∗†. BERT-48 (Zhao et al., 2019), Evaluation = MNLI, MRPC, SST-2. BERT-192 (Zhao et al., 2019), Compression Performance Speedup = × 5.7. BERT-192 (Zhao et al., 2019), = 93%. BERT-192 (Zhao et al., 2019), = × 22. BERT-192 (Zhao et al., 2019), Model = BERT12 ∗†. BERT-192 (Zhao et al., 2019), Evaluation = MNLI, MRPC, SST-2. Distillation TinyBERT (Jiao et al., 2019), Compression Performance Speedup = × 7.5. Distillation TinyBERT (Jiao et al., 2019), = 96%. Distillation TinyBERT (Jiao et al., 2019), = × 9.4. Distillation TinyBERT (Jiao et al., 2019), Model = BERT4 †. Distillation TinyBERT (Jiao et al., 2019), Evaluation = No WNLI; SQuAD. MobileBERT (Sun et al., 2020), Compression Performance Speedup = × 4.3. MobileBERT (Sun et al., 2020), = 100%. MobileBERT (Sun et al., 2020),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.2 Compression techniques\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.\n= × 1.6 × 1.9. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Model = BERT6 BERT6. DistilBERT (Sanh et al., 2019a) BERT6-PKD (Sun et al., 2019a), Evaluation = All GLUE tasks, SQuAD No WNLI, CoLA, STS-B; RACE. BERT3-PKD (Sun et al., 2019a), Compression Performance Speedup = × 2.4. BERT3-PKD (Sun et al., 2019a), = 92%. BERT3-PKD (Sun et al., 2019a), = × 3.7. BERT3-PKD (Sun et al., 2019a), Model = BERT3. BERT3-PKD (Sun et al., 2019a), Evaluation = No WNLI, CoLA, STS-B; RACE. Aguilar et al. (2019), Exp. 3, Compression Performance Speedup = × 1.6. Aguilar et al. (2019), Exp. 3, = 93%. Aguilar et al. (2019), Exp. 3, = -. Aguilar et al. (2019), Exp. 3, Model = BERT6. Aguilar et al. (2019), Exp. 3, Evaluation = CoLA, MRPC, QQP, RTE. , Compression Performance Speedup = . , = 87%. , = . , Model = . , Evaluation = . BERT-48 (Zhao et al., 2019), Compression Performance Speedup = × 62. BERT-48 (Zhao et al., 2019),", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.3 World knowledge\nThe bulk of evidence about commonsense knowledge captured in BERT comes from practitioners using it to extract such knowledge. One direct probing study of BERT reports that BERT struggles with pragmatic inference and role-based event knowledge (Ettinger, 2019). BERT also struggles with abstract attributes of objects, as well as visual and perceptual properties that are likely to be assumed rather than mentioned (Da and Kasai, 2019).\nThe MLM component of BERT is easy to adapt for knowledge induction by filling in the\nKG\nDante\nborn-in\nFlorence\nFigure 1:\nQuerying knowledge bases (KB) and lan-\nguage models (LM) for factual knowledge. Figure 2: BERT world knowledge (Petroni et al., 2019)\nvast amounts of linguistic knowledge (Peters et al., 2018b; Goldberg, 2019; Tenney et al., 2019) useful for downstream tasks. This knowledge is usually accessed either by conditioning on latent context representations produced by the original model or by using the original model weights to initialize a task-specific model which is then further fine-tuned. This type of knowledge transfer is crucial for current state-of-the-art results on a wide range of tasks. In contrast, knowledge bases are e ective soblanks (e.g. \"Cats like to chase [___]\"). Petroni et al. (2019) showed that, for some relation types, vanilla BERT is competitive with methods relying on knowledge bases (Figure 2), and Roberts et al. (2020) show the same for open-domain QA using T5 model (Raffel et al., 2019). Davison et al. (2019) suggest that it generalizes better to unseen data. In order to retrieve BERT's knowledge, we need good template sentences, and there is work on their automatic extraction and augmentation (Bouraoui et al., 2019; Jiang et al., 2019b).", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "6.1 Overparameterization\nIn general, larger BERT models perform better (Liu et al., 2019a; Roberts et al., 2020), but not always: BERT-base outperformed BERT-large on subject-verb agreement (Goldberg, 2019) and sentence subject detection (Lin et al., 2019). Given the complexity of language, and amounts of pretraining data, it is not clear why BERT ends up with redundant heads and layers. Clark et al. (2019) suggest that one possible reason is the use of attention dropouts, which causes some attention weights to be zeroed-out during training.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "How many affiliate banks has First Financial Bankshares ?", - "target_page": 4, - "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Nature of Operations\nFirst Financial Bankshares, Inc. (a Texas corporation) ('Bankshares') is a financial holding company which owns (through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of December 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First National Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; Stephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, National Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank's primary source of revenue is providing loans and banking services to consumers and commercial customers in the market area in which the subsidiary is located.\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the 'Company') applied in the preparation of the accompanying consolidated financial statements follows. The accounting principles followed by the Company and the methods of applying them are in conformity with both accounting principles generally accepted in the United States of America and prevailing practices of the banking industry.", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 81, - "page_end": 81, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 93, - "page_end": 93, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 91, - "page_end": 91, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 76, - "page_end": 76, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 75, - "page_end": 75, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 92, - "page_end": 92, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "2002 ANNUAL REPORT\n2 Corporate Profile\n3 Financial Highlights\n4 Letter to Shareholders\n6 Shareholder Values\n12 Selected Financial Data\n13 Trust Services\n14 Subsidiary Bank Reports Financial Summaries Senior Officers and Directors Market Share\n25 Form 10-K\nInside Back Cover Corporate Information\nAt First Financial Bankshares, we are not a complicated company. Our value is easy to calculate because our numbers are easy to follow. The same holds true for our values. We believe in doing business the right way - from our boardrooms to our mailrooms. Maybe it's our West Texas roots, but we still appreciate the days when a handshake was binding. The relationships we have developed with our customers bear this out. More and more, in communities across Texas, we're the banks people turn to for financial services. The result has been strong, consistent, above-sector performance for our shareholders. How do values drive value? Let us explain.\n2\nFirst Financial Bankshares, Inc. is a financial holding company\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion as of December 31, 2002. The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. The common stock of First Financial Bankshares, Inc. is held by more than 3,500 shareholders and is listed on The NASDAQ Stock Market ¤ under the symbol FFIN.\n'Our 10 affiliate banks provide services from 28 full-service locations in the Central, West and High Plains regions of Texas.'", - "page_start": 1, - "page_end": 3, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Banks\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the scope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable on loans, the amount of dividends declared, and required capitalization ratios.\nNational Banking Associations . Banks that are organized as national banking associations under the National Bank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The OCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank, Sweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National Bank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank, Mineral Wells. The OCC's supervision and regulation of banks is primarily intended to protect the interests of depositors. The National Bank Act:\n· requires each national banking association to maintain reserves against deposits,\n· restricts the nature and amount of loans that may be made and the interest that may be charged, and\n· restricts investments and other activities.\n4\nState Banks . Banks that are organized as state banks under Texas law are subject to regulation and examination by the Banking Commissioner of the State of Texas. The Commissioner regulates and supervises, and the Texas Banking Department regularly examines, Hereford State Bank and Stephenville Bank and Trust Co. The Commissioner's supervision and regulation of banks is primarily designed to protect the interests of depositors. Texas law\n· requires each state bank to maintain reserves against deposits,\n· restricts the nature and amount of loans that may be made and the interest that may be charged, and\n· restricts investments and other activities.\nBecause our Texas-chartered banks are members of the FDIC, they are also subject to regulation at the federal level by the FDIC, and are subject to most of the federal laws described below.", - "page_start": 31, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the acquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing a method that approximates the expected attrition of the deposits.", - "page_start": 74, - "page_end": 74, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "What was the net income of First Financial Bankshares in 1995 ?", - "target_page": 14, - "target_passage": " 16,355", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 91, - "page_end": 91, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 76, - "page_end": 76, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 93, - "page_end": 93, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 92, - "page_end": 92, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 81, - "page_end": 81, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", - "page_start": 75, - "page_end": 75, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Nature of Operations\nFirst Financial Bankshares, Inc. (a Texas corporation) ('Bankshares') is a financial holding company which owns (through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of December 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First National Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; Stephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, National Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank's primary source of revenue is providing loans and banking services to consumers and commercial customers in the market area in which the subsidiary is located.\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the 'Company') applied in the preparation of the accompanying consolidated financial statements follows. The accounting principles followed by the Company and the methods of applying them are in conformity with both accounting principles generally accepted in the United States of America and prevailing practices of the banking industry.", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000\nThe approximate effects of each type of difference that gave rise to the Company's deferred tax assets and liabilities at December 31, 2002 and 2001, are as follows:", - "page_start": 82, - "page_end": 82, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the acquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing a method that approximates the expected attrition of the deposits.", - "page_start": 74, - "page_end": 74, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Payment of Dividends\nWe are a legal entity separate and distinct from our banking and other subsidiaries. We receive most of our revenue from dividends paid to us by our Delaware holding company subsidiary. Similarly, the Delaware holding company subsidiary receives dividends from our bank subsidiaries. Described below are some of the laws and regulations that apply when either we or our subsidiary banks pay dividends.\nEach state bank that is a member of the Federal Reserve System and each national banking association is required by federal law to obtain the prior approval of the Federal Reserve Board and the OCC, respectively, to declare and pay dividends if the total of all dividends declared in any calendar year would exceed the total of (1) such bank's net profits (as defined and interpreted by regulation) for that year plus (2) its retained net profits (as defined and interpreted by regulation) for the preceding two calendar years, less any required transfers to surplus. In addition, these banks may only pay dividends to the extent that retained net profits (including the portion transferred to surplus) exceed bad debts (as defined by regulation).\n5\nOur subsidiary banks paid aggregate dividends of approximately $26.6 million in 2002 and approximately $25.5 million in 2001. Under the dividend restrictions discussed above, as of December 31, 2002, our subsidiary banks, without obtaining governmental approvals, could have declared in the aggregate additional dividends of approximately $20.7 million from retained net profits.\nTo pay dividends, we and our subsidiary banks must maintain adequate capital above regulatory guidelines. In addition, if the applicable regulatory authority believes that a bank under its jurisdiction is engaged in or is about to engage in an unsafe or unsound practice (which, depending on the financial condition of the bank, could include the payment of dividends), the authority may require, after notice and hearing, that such bank cease and desist from the unsafe practice. The Federal Reserve Board and the OCC have each indicated that paying dividends that deplete a bank's capital base to an inadequate level would be an unsafe and unsound banking practice. The Federal Reserve Board, the OCC and the FDIC have issued policy statements that recommend that bank holding companies and insured banks should generally only pay dividends to the extent that net income is sufficient to cover both cash dividends and rate of earnings retention consistent with capital needs, asset quality and overall financial condition. No undercapitalized institution may pay a dividend.", - "page_start": 32, - "page_end": 33, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "What is the address of the San Angelo National Bank main office ?", - "target_page": 21, - "target_passage": "Main Office 301 W. Beauregard San Angelo, Texas 76903 Chartered 1997 ", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "TRUST ASSETS in millions\nDavid Byrd San Angelo National Bank\n13\n14", - "page_start": 14, - "page_end": 15, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = $ 32,880,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 5%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . San Angelo National Bank, Amount = $ 26,672,000. San Angelo National Bank, Ratio = 9%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 8,800,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 3%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 14,667,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 5%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . Weatherford National Bank, Amount = $ 18,019,000. Weatherford National Bank, Ratio = 9%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 5,788,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 3%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 9,647,000. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 5%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ", - "page_start": 88, - "page_end": 88, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = N/A. Consolidated, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = N/A. First National Bank of Abilene, Amount = $ 64,971,000. First National Bank of Abilene, Ratio = 16%. First National Bank of Abilene, For Capital Adequacy Purposes:.Amount = ≥ $ 16,077,000. First National Bank of Abilene, For Capital Adequacy Purposes:.Ratio = ≥ 4%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ $ 24,115,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ 6%. San Angelo National Bank, Amount = $ 14,703,000. San Angelo National Bank, Ratio = 11%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 5,408,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 4%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ $ 8,112,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ 6%. Weatherford National Bank, Amount = $ 18,757,000. Weatherford National Bank, Ratio = 17%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 4,401,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 4%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount", - "page_start": 87, - "page_end": 87, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = N/A. Consolidated, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . First National Bank of Abilene, Amount = $ 61,895,000. First National Bank of Abilene, Ratio = 16%. First National Bank of Abilene, For Capital Adequacy Purposes:.Amount = ≥ $ 15,797,000. First National Bank of Abilene, For Capital Adequacy Purposes:.Ratio = ≥ 4%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 23,695,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 6%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . San Angelo National Bank, Amount = $ 26,672,000. San Angelo National Bank, Ratio = 20%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 4,312,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 4%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 8,194,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 6%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . Weatherford National Bank, Amount = $ 18,019,000. Weatherford National Bank, Ratio = 17%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 5,462,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 4%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount", - "page_start": 88, - "page_end": 88, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = N/A. Consolidated, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . First National Bank of Abilene, Amount = $ 65,676,000. First National Bank of Abilene, Ratio = 17%. First National Bank of Abilene, For Capital Adequacy Purposes:.Amount = ≥ $ 31,594,000. First National Bank of Abilene, For Capital Adequacy Purposes:.Ratio = ≥ 8%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ $ 39,492,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = . First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 10%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . San Angelo National Bank, Amount = $ 27,945,000. San Angelo National Bank, Ratio = 20%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 10,925,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 8%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 13,656,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 10%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . Weatherford National Bank, Amount = $ 18,931,000. Weatherford National Bank, Ratio = 18%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 8,624,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 8%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount", - "page_start": 88, - "page_end": 88, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Services Offered by Our Subsidiary Banks\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own board of directors and officers. Each of our subsidiary banks provides general commercial banking services, which include accepting and holding checking, savings and time deposits, making loans, automated teller machines, drivein and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial banking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other employee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and Trust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete\n2\nrange of services to individuals, associations, and corporations. These services include administering estates, testamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, First Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, Southlake, Texas provide securities brokerage services through arrangements with various third parties.\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose national bank under which we will consolidate the management of our current trust departments. The new entity will operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We believe that with this structure we can more effectively manage our current trust operations and provide trust services to customers of our banks that do not currently have trust departments. We anticipate that the new trust company will begin operations in the latter part of 2003.", - "page_start": 29, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Main Office\n301 W. Beauregard San Angelo, Texas 76903 Chartered 1997", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Nature of Operations\nFirst Financial Bankshares, Inc. (a Texas corporation) ('Bankshares') is a financial holding company which owns (through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of December 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First National Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; Stephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, National Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank's primary source of revenue is providing loans and banking services to consumers and commercial customers in the market area in which the subsidiary is located.\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the 'Company') applied in the preparation of the accompanying consolidated financial statements follows. The accounting principles followed by the Company and the methods of applying them are in conformity with both accounting principles generally accepted in the United States of America and prevailing practices of the banking industry.", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Banks\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the scope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable on loans, the amount of dividends declared, and required capitalization ratios.\nNational Banking Associations . Banks that are organized as national banking associations under the National Bank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The OCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank, Sweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National Bank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank, Mineral Wells. The OCC's supervision and regulation of banks is primarily intended to protect the interests of depositors. The National Bank Act:\n· requires each national banking association to maintain reserves against deposits,\n· restricts the nature and amount of loans that may be made and the interest that may be charged, and\n· restricts investments and other activities.\n4\nState Banks . Banks that are organized as state banks under Texas law are subject to regulation and examination by the Banking Commissioner of the State of Texas. The Commissioner regulates and supervises, and the Texas Banking Department regularly examines, Hereford State Bank and Stephenville Bank and Trust Co. The Commissioner's supervision and regulation of banks is primarily designed to protect the interests of depositors. Texas law\n· requires each state bank to maintain reserves against deposits,\n· restricts the nature and amount of loans that may be made and the interest that may be charged, and\n· restricts investments and other activities.\nBecause our Texas-chartered banks are members of the FDIC, they are also subject to regulation at the federal level by the FDIC, and are subject to most of the federal laws described below.", - "page_start": 31, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Branch\n3471 Knickerbocker San Angelo, Texas 76904", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "What kind of scholarship programs are available to start a financial career?", - "target_page": 1, - "target_passage": "Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3 Great Resources to Kick-Start Your Financial Planning Career\n11/23/2022\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should be a top contender, whether you are just starting out or looking to make a career change. But once you have decided that financial planning is the field for you, how do you get started? Here are three resources that can help you launch a successful financial planning career.\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide introduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry points and career tracks, explores the types of companies that hire financial planners and provides information on how to find financial planning career opportunities. It also includes resources such as a list of recommended questions to ask in a job interview.\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional journey. Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning, which administers 16 scholarship programs that help pay for the education and exam requirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer scholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and credentials such as CFP® certification -- some of which may be required to advance within the company.\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective employers. CFP Board's spring and fall career fairs are some of the most popular hiring events in the profession, with dozens of firms participating in these online exhibitions. Job seekers can visit employers' virtual exhibit booths and view open jobs and internships, apply for open positions and interact with employers through one-on-one video meetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship opportunities in financial planning, as well as a collection of articles providing career guidance.\nOther top resources include career offices at your college or university, financial services companies' career websites and professional organizations that may have a local chapter near you.", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "Educational Impact\nWe are also proud to help prepare tomorrow's leaders today. In 2010 Chesapeake supported universities, schools, academic chairs, scholarships and other educational programs with contributions totaling $5.4 million.\nInvesting in programs that promote technology and innovation is a key to our country's success. That's why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM), a public, tuition-free, residential high school located in Oklahoma City for juniors and seniors with exceptional abilities. The extremely competitive school is helping train the next generation of scientists and mathematicians.\nWe also established the Chesapeake Energy Presidential Scholars Program at the Oklahoma City University Meinders School of Business, making a $5.0 million commitment to be distributed over the next five years. The Chesapeake Scholars Program will provide up to $25,000 per year in tuition\nto selected students pursuing careers in finance, economics, accounting, marketing, business administration, computer science and information technology. In addition, scholars will take part in a Chesapeake Presidential Leadership Course facilitated by faculty members in coordination with designated Chesapeake leadership coaches, including a Chesapeake senior vice president and OCU alumni.\nIn 2007 Chesapeake launched a scholarship program in Texas with an initial $1.25 million contribution, challenging the cities of Fort Worth and Dallas to match its gift within a year. The cities responded and matched the gift, so Chesapeake in 2008 added another $1.25 million to the fund, bringing the total to $3.75 million. The Chesapeake Scholarship Fund currently funds the cost of higher education for 48 minority students. The fund provides each student $20,000 a year for up to four years at the school of their choice. To date more than $1.0 million has been distributed to deserving local students.\nTo help ensure the training of qualified geologists, engineers, landmen and energy lawyers in the next generation, we award scholarships to students pursuing energy-related degrees. We also help mentor them through Chesapeake's Peak Program. Junior- and senior-level scholarship recipients are paired with Chesapeake employee mentors who help develop students' knowledge and provide career advice. There are currently 25 mentors and 40 scholarship recipients participating in the Peak Program.", - "page_start": 25, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "DEVOTION TO SERVICE\nor us, it is a measure of responsible corporate citizenship. The MGM MIRAGE Corporate Charitable Giving Program is the principal source of financial donations to community and social initiatives. Funded by a percentage of the company's net profits, the Corporate Charitable Giving Program supports various community efforts impacting four critical areas: F\nCHILDHOOD DEVELOPMENT Community-based programs that focus on the overall development and well-being of children.\nCOMMUNITY DEVELOPMENT Programs that focus on low-income or socio-economically disadvantaged communities.\nDIVERSITY Programs which are inclusive receive priority in funding. This includes efforts that encourage economic development and enhance individual and community resources.\nEDUCATION Programs and efforts to strengthen public education from kindergarten through higher education.\nThrough various education partnerships with institutions such as the University of Nevada, we award scholarships to help students achieve their educational goals and to encourage their interest in our business. Additionally, scholarship programs assist the children of our employees with their higher education aspirations", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Supporting Killam Families with Scholarship program\nKillam's Scholarship Program awards three $3,000 scholarships to children or grandchildren of Killam employees on an annual basis. After a competitive application process in 2013, Bradley Price, Hayley Gillis and Georgia Telman were selected for demonstrating an outstanding combination of academic excellence and community involvement.", - "page_start": 19, - "page_end": 19, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Financial education through teaching of investment skills\nSMBC Friend Securities runs an online SMBC Friend Securities runs an online education program, 'You education program, 'You · You Toshi' You Toshi' (Self-composed Investment), for (Self-composed Investment), for inexperiinexperienced investors. enced investors.\nThe service is free and includes a training The service is free and includes a training program that can be used as a tool for program that can be used as a tool for lifelong study of investment skills. lifelong study of investment skills.\nSumitomo Mitsui Financial Group CSR Report\nSpecific Examples of CSR Activities", - "page_start": 8, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "FINANCIAL STRENGTH AND FLEXIBILITY\nFinancially strong with an investment grade balance sheet, conservative debt leverage, and significant available financial liquidity.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "10. FINANCIAL INSTRUMENTS WITH OFF-BALANCE-SHEET RISK:\nThe Company is a party to financial instruments with off-balance-sheet risk in the normal course of business to meet the financing needs of its customers. These financial instruments include unfunded lines of credit, commitments to\nF-20", - "page_start": 83, - "page_end": 83, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n(e)\n(a)", - "page_start": 53, - "page_end": 53, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n(b)", - "page_start": 52, - "page_end": 52, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "what are career fairs for?", - "target_page": 1, - "target_passage": " In-person and virtual career fairs provide valuable opportunities to connect with prospective employers.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "NOTE 6: FAIR VALUE MEASUREMENTS\nMarketable securities measured at fair value at June 30, 2012 and June 30, 2011 totaled $10,322 and $10,881, respectively. These marketable securities are held in a rabbi trust for a non-qualified deferred compensation plan. The marketable securities are included in other assets on the consolidated balance sheets and their fair values were derived using quoted market prices (Level 1 in the fair value hierarchy).", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "(d) Fair value measurements\nThe carrying values of financial assets and liabilities of the Group approximate their fair values. Fair values of financial assets and liabilities have been determined for measurement and / or disclosure purposes.", - "page_start": 104, - "page_end": 104, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "3 Great Resources to Kick-Start Your Financial Planning Career\n11/23/2022\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should be a top contender, whether you are just starting out or looking to make a career change. But once you have decided that financial planning is the field for you, how do you get started? Here are three resources that can help you launch a successful financial planning career.\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide introduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry points and career tracks, explores the types of companies that hire financial planners and provides information on how to find financial planning career opportunities. It also includes resources such as a list of recommended questions to ask in a job interview.\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional journey. Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning, which administers 16 scholarship programs that help pay for the education and exam requirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer scholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and credentials such as CFP® certification -- some of which may be required to advance within the company.\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective employers. CFP Board's spring and fall career fairs are some of the most popular hiring events in the profession, with dozens of firms participating in these online exhibitions. Job seekers can visit employers' virtual exhibit booths and view open jobs and internships, apply for open positions and interact with employers through one-on-one video meetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship opportunities in financial planning, as well as a collection of articles providing career guidance.\nOther top resources include career offices at your college or university, financial services companies' career websites and professional organizations that may have a local chapter near you.", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "CC LICENSE CAN'T BE USED FOR …\nfair use, fair dealing, or some other limitation and exception to copyright applies the the work.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Fair Values\nFinancial assets, Carrying value.2013. = . Financial assets, Carrying value.Dec. 31, 2012. = . Financial assets, Fair value measurements at reporting date.Level 1..2013 = . Financial assets, Fair value measurements at reporting date.Level 1.Dec. 31, 2012. = . Financial assets, Fair value measurements at reporting date.Level 2.2013. = . Financial assets, Fair value measurements at reporting date.Level 2.Dec. 31,.2012 = . Available-for-sale, measured at fair value:, Carrying value.2013. = . Available-for-sale, measured at fair value:, Carrying value.Dec. 31, 2012. = . Available-for-sale, measured at fair value:, Fair value measurements at reporting date.Level 1..2013 = . Available-for-sale, measured at fair value:, Fair value measurements at reporting date.Level 1.Dec. 31, 2012. = . Available-for-sale, measured at fair value:, Fair value measurements at reporting date.Level 2.2013. = . Available-for-sale, measured at fair value:, Fair value measurements at reporting date.Level 2.Dec. 31,.2012 = . Investments in publicly traded companies, Carrying value.2013. = $ 809. Investments in publicly traded companies, Carrying value.Dec. 31, 2012. = $ 624. Investments in publicly traded companies, Fair value measurements at reporting date.Level 1..2013 = $ 809. Investments in publicly traded companies, Fair value measurements at reporting date.Level 1.Dec. 31, 2012. = $ 624. Investments in publicly traded companies, Fair value measurements at reporting date.Level 2.2013. = $ -. Investments in publicly traded companies, Fair value measurements at reporting date.Level 2.Dec. 31,.2012 = $ -. Held-for-trading:, Carrying value.2013. = . Held-for-trading:, Carrying value.Dec. 31, 2012. = . Held-for-trading:, Fair value measurements at reporting date.Level 1..2013 = . Held-for-trading:, Fair value measurements at reporting date.Level 1.Dec. 31, 2012. = . Held-for-trading:, Fair value measurements at reporting date.Level 2.2013. = . Held-for-trading:, Fair value measurements at reporting date.Level 2.Dec. 31,.2012", - "page_start": 120, - "page_end": 120, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Note 2 - Fair Value of Financial Instruments\nASC 820, Fair Value Measurements ('ASC 820') states that fair value is an exit price, representing the amount that would be received to sell an asset or paid to transfer a liability in an orderly transaction between market participants. As such, fair value is a market-based measurement that should be determined based on assumptions that market participants would use in pricing an asset or a liability. The three-tiered fair value hierarchy, which prioritizes which inputs should be used in measuring fair value, is comprised of: (Level I) observable inputs such as quoted prices in active markets; (Level II) inputs other than quoted prices in active markets that are observable either directly or indirectly and (Level III) unobservable inputs for which there is little or no market data. The fair value hierarchy requires the use of observable market data when available in determining fair value. Our assets and liabilities that were measured at fair value on a recurring basis were as follows (in millions):\nTable of Contents", - "page_start": 19, - "page_end": 19, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Trade creditors, other creditors and accruals\nThe carrying amount approximates fair value.", - "page_start": 64, - "page_end": 64, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "(3) Fair Value of Investments\nThe following tables present the fair value of investments based on hierarchical level as of June 30, 2024 and 2023:", - "page_start": 13, - "page_end": 13, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Percent of Total Loans:\n..........................., At December 31,.2001.Fair Value = 42,687. Mortgage-backed securities ..........................., At December 31,.2000.Amortized Cost = 53,541. Mortgage-backed securities ..........................., At December 31,.2000.Fair Value = 54,005. Other securities......................\n-, At December 31,.2002.Amortized Cost = . Other securities...................... -, At December 31,.2002.Fair Value = -. Other securities...................... -, At December 31,.2001.Amortized Cost = 4. Other securities...................... -, At December 31,.2001.Fair Value = 4. Other securities...................... -, At December 31,.2000.Amortized Cost = -. Other securities...................... -, At December 31,.2000.Fair Value = -. , At December 31,.2002.Amortized Cost = 200,450. , At December 31,.2002.Fair Value = 211,862. , At December 31,.2001.Amortized Cost = 290,674. , At December 31,.2001.Fair Value = 298,570. , At December 31,.2000.Amortized Cost = 391,918. , At December 31,.2000.Fair Value = 393,591\n23\nTable 11 - Maturities and Yields of Investment Securities Held at December 31, 2002 (in thousands, except percentages):", - "page_start": 50, - "page_end": 51, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Capital Resources\nTable 13 - Interest Sensitivity Analysis (in thousands, except percentages):\n........................................, December 31, 2002 Estimated Fair Value = ", - "page_start": 53, - "page_end": 53, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "What are the priorities for job seekers ?", - "target_page": 1, - "target_passage": " Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3 Great Resources to Kick-Start Your Financial Planning Career\n11/23/2022\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should be a top contender, whether you are just starting out or looking to make a career change. But once you have decided that financial planning is the field for you, how do you get started? Here are three resources that can help you launch a successful financial planning career.\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide introduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry points and career tracks, explores the types of companies that hire financial planners and provides information on how to find financial planning career opportunities. It also includes resources such as a list of recommended questions to ask in a job interview.\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional journey. Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning, which administers 16 scholarship programs that help pay for the education and exam requirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer scholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and credentials such as CFP® certification -- some of which may be required to advance within the company.\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective employers. CFP Board's spring and fall career fairs are some of the most popular hiring events in the profession, with dozens of firms participating in these online exhibitions. Job seekers can visit employers' virtual exhibit booths and view open jobs and internships, apply for open positions and interact with employers through one-on-one video meetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship opportunities in financial planning, as well as a collection of articles providing career guidance.\nOther top resources include career offices at your college or university, financial services companies' career websites and professional organizations that may have a local chapter near you.", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "LETTER TO THE SHAREHOLDERS\nVolunteerism is in Patty Pomeroy's blood. Her grandfather was a dispatcher for the rescue squad in Middletown, VA for 25 years and her grandmother was in the ladies auxiliary. Her father was a charter member of the Middletown Rescue Squad. In 1997, Patty, a customer service representative at Shentel for four years, continued the family tradition by earning her Emergency Medical Technician certification and going to 'work' for the Strasburg Rescue Squad. Patty is the administrator of membership recruitment and retention for the squad and is the liaison coordinator for junior squad members under 18. It is her job to make sure that new members are brought in to the squad and current members stay active.\n'There is a great satisfaction that comes from knowing that what you can do will help people.'\nJeff Beard has been an installer repairman with Shentel for almost five years. Two years ago, Jeff helped start Project Isaiah 58, a faith-based recovery ministry that reaches out to people who are struggling with addiction. Project Isaiah 58 has weekly group meetings in Winchester, Woodstock and Warrenton, VA. Jeff, who lives in Winchester, participates in the group meetings and also makes time to meet one-on-one with people who need personal attention.\n'I feel the need to reach out to people who are suffering.'\nJeff Beard\nJohn Gardner has been with Shentel for two years as a PCS technician in Central Pennsylvania, but for almost a year of that time he was on Naval Reserve duty in Sasebo, Japan. John joined the Reserves after serving 10 years of active duty. In October 2002, he was activated under Noble Eagle-Enduring Freedom as part of the increase in security at bases around the world. John worked on Motorola radios and repeater systems while stationed in Japan. It was tough for the serviceman to be away from his wife and children, but John believes very strongly in serving his country.\n'Being in the Reserves is a way for me to be a civilian and still serve my country.'\nJohn Gardner\nAt Shentel, George Brinkley, the store manager in Front Royal, VA, is known for being one of the biggest fund-raisers for the Shenandoah County American Cancer Society Relay for Life event. In his six years at the Company, George has raised nearly $20,000. In 2003, he raised $4,246 and was recognized as the top individual fund-raiser for the entire event.", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Diversity\nThe Company has a policy to improve the diversity of its workforce over time by identifying women and individuals from under-represented backgrounds for recruitment, and by rewarding and promoting employees on the basis of performance.\nHowever, at this stage of its development, the Company has a small Board of Directors, and a small management team which is geographically dispersed and because of the industry in which the Company operates, the Board does not consider it to be practicable to set measurable objectives to achieve greater gender diversity at this time.\nIn addition, the Board acknowledges the benefits of seeking to improve gender diversity at all levels in the Company over time and will keep this issue under review.\nThe Company aims to foster continuous improvement in the area of diversity; building on achievement realised through the implementation of historical diversity initiatives, by applying principles successfully used at our leading operation in this area, to other parts of the business.\nOur flagship 'Chatree' Mine in Thailand boasts the enviable statistic of having equal representation by women on the senior management team. Recruitment, training and promotion principles employed at Chatree are currently being applied to our 'Challenger' Mine in Australia, where we currently have 14% representation of women across the senior management and professional categories and to other parts of the business.\nThere is currently no representation by women on our Board of Directors. Whilst this is in part reflective of the relatively small size of the Board and stage of development of key elements of the business, it forms part of an overall business review process to consider the issue of gender diversity at this level and will be the subject of ongoing review.\nThe Company considers that it will benefit from its ongoing commitment to promote a diverse workforce with treatment of employees and future employees on the basis of merit, abilities and potential, regardless of gender, colour, ethnic or national origin, race, disability, age, sexual orientation, gender reassignment, socioeconomic background, religious or political belief, non / trade union membership, family circumstances or other irrelevant distinction.\nThe Company has set various criteria and procedures in order to support equality and diversity in the workforce and applies these principles to:\n〉 Provide fair access to workplace opportunities and benefits, including internal promotion, leadership development, flexible work practices and fair and comparable wages;\n〉 Attracting and retaining a skilled and diverse workforce;\n〉 Creating an inclusive workplace culture where discriminatory behaviour is unacceptable; and\n〉 Providing an effective grievance mechanism for employees.", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "General Manager Exploration and Resource Development\nRon James has 30 years of experience in exploration and mining at management level inclusive of setting up gold mines and exploration projects from their earliest stages through to development and sustainability. Before joining Kingsgate, he was Chief Mine Geologist at the Gold Ridge Mine in the Solomon Islands and later Group Exploration Manager for Ross Mining NL. Ron is familiar with the technical and operating requirements for emerging projects in a variety of terrains and environments and has a strong focus on maximising returns from ore bodies through optimum waste and ore classification as well as increasing reserves from nearmine resource development.\ncontinued\nu\n39\nSenior Management\nSenior Management\nSenior Management", - "page_start": 40, - "page_end": 41, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Risk management\nThe Group manage the risks listed above, and other day-to-day risks, through an established management framework. The Group has policies in place to manage risk in the areas of health and safety, environment and equal employment opportunity.\nManagement and the Board regularly review the risk portfolio of the business and the effectiveness of the Group's management of those risks.", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Occupation\nRefers to your current job (if you are employed). If you are unemployed, you can simply write 'unemployed' or 'not applicable'.", - "page_start": 22, - "page_end": 22, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Exploration\nWith the approvals of the Special Prospecting Licence ('SPL') applications in Thailand still awaiting the Minister of Industry's consent, exploration attention over the past 12 months has focused on new exploration opportunities and Mineral Resource enhancement targets within the Mining Leases. This exploration formed part of a strategic exploration program within the mining leases at Chatree that commenced in late 2012. The program has successfully defined several new areas of mineralisation within the Mining Lease, most notably at Q and A North Prospects, and has also upgraded several larger areas of Inferred Resources to the Measured and Indicated Mineral Resource category.\n5\nManaging Director and CEO's Report", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "CREATING OPPORTUNITIES\nMaximising the value of the exploration program, building a better and more balanced portfolio and pursuing new opportunities.", - "page_start": 2, - "page_end": 2, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2.6 Data collection\nThe interview guide (Table 4) was developed based on literature reviews, clinical experience and discussions within the research group and with user representatives. Two test interviews were\nFrontiers in Rehabilitation Sciences\n04\nfrontiersin.org\nTABLE 3 Participant demographic information.\nTABLE 4 Interview guide.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "State space search\nState space search searches through a tree of possible states to try to find a goal state. [69] For example, planning algorithms search through trees of goals and subgoals, attempting to find a path to a target goal, a process called means-ends analysis. [70]\nSimple exhaustive searches [71] are rarely sufficient for most real-world problems: the search space (the number of places to search) quickly grows to astronomical numbers. The result is a search that is too slow or never completes. [15] \"Heuristics\" or \"rules of thumb\" can help prioritize choices that are more likely to reach a goal. [72]\nAdversarial search is used for game-playing programs, such as chess or Go. It searches through a tree of possible moves and countermoves, looking for a winning position. [73]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "What does ShareAlike mean in terms of licencing ?", - "target_page": 1, - "target_passage": "adaptations based on this work must be licensed under the same license.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Notes to Consolidated Financial Statements\nSubsidiaries = 13,738. Preopening and start-up expenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Non-Guarantor Subsidiaries = -. Preopening and start-up expenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Elimination = -. Preopening and start-up expenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Consolidated = 14,141. Restructuring costs (credit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Parent = -. Restructuring costs (credit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Guarantor", - "page_start": 76, - "page_end": 76, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nSubsidiaries = (26,347). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Non-Guarantor Subsidiaries = (15,652). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Elimination = -. Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Consolidated = (279,665). Other, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Parent = -. Other, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Guarantor", - "page_start": 76, - "page_end": 76, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nSubsidiaries = (17,021). Restructuring costs (credit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Non-Guarantor Subsidiaries = -. Restructuring costs (credit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Elimination = -. Restructuring costs (credit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Consolidated = (17,021). Property transactions, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Parent = -. Property transactions, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Guarantor", - "page_start": 76, - "page_end": 76, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "NOTE 16 - CONSOLIDATING CONDENSED FINANCIAL INFORMATION\n(In thousands).Parent = (322,627). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Guarantor Subsidiaries = (49,129). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Non-Guarantor Subsidiaries = (966). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Elimination = -. Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Consolidated = (372,722). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Parent = (278,122). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Guarantor Subsidiaries = (53,378). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Non-Guarantor Subsidiaries = (2,008). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Elimination = -. Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Consolidated = (333,508). Other, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., As of and for the Years Ended December 31", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "2) Summarized consolidated statements of income by business segment\nshort-term borrowings ..................................................................................................................., Millions of yen.Sales Financing = 315,196. (Decrease) increase in short-term borrowings ..................................................................................................................., Millions of yen.Consolidated total = (54,310). (Decrease) increase in long-term borrowings ....................................................................................................................., Millions of yen.Automobile and Eliminations = (81,106). (Decrease) increase in long-term borrowings", - "page_start": 101, - "page_end": 101, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Results of Operations\nTable 4 - Noninterest Expense (in thousands):\nsalaries and employee benefits...................., 2000 = 27,077. Net occupancy expense............................................., 2002 = 3,909. Net occupancy expense............................................., Increase (Decrease) = (87). Net occupancy expense............................................., 2001 = 3,996. Net occupancy expense............................................., Increase (Decrease) = 433. Net occupancy expense............................................., 2000 = 3,563. Equipment expense ..................................................., 2002 = 4,801. Equipment expense ..................................................., Increase (Decrease) = 343. Equipment expense", - "page_start": 47, - "page_end": 47, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "NOTE 16 - CONSOLIDATING CONDENSED FINANCIAL INFORMATION\n(In thousands).Parent = 4,607,118. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Guarantor Subsidiaries = 851,730. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Non-Guarantor Subsidiaries = -. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Elimination = - -. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004.Consolidated = 5,458,848. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Parent = 4,640,365. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Guarantor Subsidiaries = 878,651 71,702. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Non-Guarantor Subsidiaries = 2,874 51,845. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Elimination = - -. Long-term debt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003.Consolidated = 5,521,890. Other non-current liabilities. . . . . . . . . . . . . . . . . . . . . .", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Consolidated Statements of Income\n. . . . . . . . . . . ., 2003 = (337,586). Interest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2002 = (283,736). Non-operating items from unconsolidated affiliates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004 = (12,298). Non-operating items from unconsolidated affiliates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003 = (10,401). Non-operating items from unconsolidated affiliates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2002 = (1,335). Other, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004 = (10,025). Other, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Business segments\nSales to third parties ..................................................., EliminationsConsolidated. = ¥7,072,982. Sales to third parties ..................................................., ¥ 356,237 = . Sales to third parties ..................................................., = ¥7,429,219. Sales to third parties ..................................................., = ¥ -. Sales to third parties ..................................................., ¥7,429,219 = . Inter-segment sales and transfers, EliminationsConsolidated. = 22,916. Inter-segment sales and transfers, ¥ 356,237 = 9,752. Inter-segment sales and transfers, = 32,668. Inter-segment sales and transfers,", - "page_start": 93, - "page_end": 93, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated Balance Sheets\n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003 = -. Current portion of long-term debt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004 = 14. Current portion of long-term debt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2003 = 9,008. Accrued interest on long-term debt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 2004 = 116,997. Accrued interest on long-term debt", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "What is the most restricive Creative Common licence ?", - "target_page": 1, - "target_passage": "CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "References\n' 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http: // creativecommons.org / licenses / by / 4.0 / ).", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed10.pdf" - }, - { - "text": "Consultation on the Renewal of Cellular and Personal Communications S ervices (PC S ) S pectrum Licences\nIn March 2011, Industry Canada released its decisions about the renewal process for cellular and PCS licences that began expiring at that time. Key things to note:\nGLYPH<129> At the end of the current licence term, new cellular and PCS licences with a 20-year term will be issued to licensees that are in compliance with all licence conditions.\nGLYPH<129> The previously existing annual fee of $0.0351 per MHz per population of the licenced area will continue to apply to all cellular and PCS licences, including those initially assigned by auction. The Minister of Industry Canada may review and amend the fees during the licence term after further consultation with licensees.\nGLYPH<129> A determination regarding existing research and development conditions of licence was not released at that time and will be released separately. A decision has not been made to date, and until such a time, the current conditions of licence remain in effect.", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Creative Commons makes sharing easy", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "1.1 Licensing\nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International Public License. I typically distribute it as a PDF but if you want to make your own version send me an email and I will send you the Word version. For details on licensing see:\nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode", - "page_start": 4, - "page_end": 4, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "In which case CC licence can't be used ?", - "target_page": 1, - "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "CC LICENSE CAN'T BE USED FOR …\nfair use, fair dealing, or some other limitation and exception to copyright applies the the work.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "NOW, SHARE YOUR WORK!\nhttps://creativecommons.org/choose/\nTexts are adapted from CC Certification for Educators. CC BY license.\nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\nBY\nSA\nND\nNC", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "What is the di/fference between CC0 and the Public Domain Mark?\nCC0 ('CC Zero') is intended for use only by authors or holders of copyright and related rights (including database rights), in connection with works that are still subject to those rights in one or more countries.\nWhen CC0 is applied to a work, copyright and related rights are relinquished worldwide, making the work free from those restrictions to the greatest extent possible.\nThe Public Domain Mark (PDM) is used to label works that are already free of known copyright restrictions. Unlike CC0, PDM doesn't change the copyright status of a work.\nPDM can be used by anyone, and is intended for use with works that are already free of known copyright restrictions throughout the world.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "ALSO FOR …\nthe work that is already in the Public Domain.\nFor those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "REMIND THAT…\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\nyou want to give others permissions to freely copy and redistribute your work, and\nyou want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "Changes in G overnment Regulations\nSubstantially all of our business activities are regulated by Industry Canada and/or the CRTC, and any regulatory changes or decisions could adversely affect our consolidated results of operations. See 'Regulation in Our Industry'.\nRegulatory changes or decisions made by these regulators could adversely impact our results of operations on a consolidated basis. This regulation relates to, among other things, licencing, competition, the cable television programming services that we must distribute, wireless and wireline interconnection agreements, the rates we may charge to provide access to our network by third parties, the resale of our networks and roaming on our networks, our operation and ownership of communications systems and our ability to acquire an interest in other communications systems. In addition, the costs of providing\nservices may be increased from time-to-time as a result of compliance with industry or legislative initiatives to address consumer protection concerns or such Internet-related issues as copyright infringement, unsolicited commercial e-mail, cybercrime and lawful access. Our cable, wireless and broadcasting licences may not generally be transferred without regulatory approval.\nGenerally, our licences are granted for a specified term and are subject to conditions on the maintenance of these licences. These licencing conditions may be modified at any time by the regulators. The regulators may decide not to renew a licence when it expires, and any failure by us to comply with the conditions on the maintenance of a licence could result in a revocation or forfeiture of any of our licences or the imposition of fines.\nThe licences include conditions requiring us to comply with Canadian ownership restrictions of the applicable legislation. We are currently in compliance with all of these Canadian ownership and control requirements. However, if these requirements are violated, we would be subject to various penalties, possibly including, in the extreme case, the loss of a licence.", - "page_start": 78, - "page_end": 78, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "In how many regions the Republic Services operations are organized ?", - "target_page": 9, - "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "General Overv i e w\nE u ronet Worldwide is a leading provider of secure electronic financial transaction solutions. The Company provides financial payment m i d d l e w a re, financial network gateways, outsourcing, and consulting services to financial institutions, retailers and mobile operators. The Company operates an independent automated teller machine ('ATM') network of over 2,600 ATMs in Europe and the United States, and t h rough its software subsidiary, Euronet USA Inc. (form e r l y, Arkansas Systems, Inc.)('Euronet USA'), offers a suite of integrated software solutions for electronic payment and transaction delivery systems. Euronet Worldwide thus offers comprehensive electronic payment solutions consisting of ATM network participation, outsourced ATM management solutions and software solutions. Its principal customers are banks and other companies such as retail outlets that re q u i re transaction processing services. With eleven offices in Europe and three in the United States, the Company offers its solutions in more than 60 countries around the world.\nE u ronet Worldwide and its subsidiaries operate in two business segments: (1) a segment providing secure processing of financial transactions (the 'Network Services Segment'); and (2) a segment producing application software for the processing of secure electronic financial transaction (the ' S o f t w a re Solutions Segment'). In addition, the Company's management divides the Network Services Segment into three sub-segments: 'Central E u ropean Sub-segment' (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), 'We s t e rn European Sub-segment' (including Germ a n y, France and the United Kingdom) and 'Other Operations Sub-segment' (including the United States and unallocated p rocessing center costs). These business segments, and their sub-segments, are supported by a corporate service segment, which pro v i d e s corporate and other administrative services that are not directly identifiable with the two business segments (the 'Corporate Services Segment'). The accounting policies of each segment are the same as those described in the summary of significant accounting policies. The Company evaluates perf o rmance based on profit or loss from operations before income taxes not including nonre c u rring gains and net loss. Prior period segment information has been restated to conform to the current period's presentation. (See Note 19 to the Consolidated Financial Statements Business segment information.)", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Operating Strategy\n, Decentralized Management Structure. We maintain a relatively small corporate headquarters staÅ, relying on a decentralized management structure to minimize administrative overhead costs and to manage our day-to-day operations more eÇciently. Our local management has extensive industry experience in growing, operating and managing solid waste companies and has substantial experience in their local geographic markets. In early 2001, we added a sales, maintenance and operations manager to each of our regional management teams, which previously consisted of a regional vice president and a regional controller. We believe that strengthening our regional management teams allows us to more eÅectively and eÇciently drive our company's initiatives and helps ensure consistency throughout our organization. Our regional management teams and our area presidents have extensive authority, responsibility and autonomy for operations within their respective geographic markets. Compensation for regional and area management teams is primarily based on the improvement in operating income produced and the free cash Öow and return on invested capital generated in each manager's geographic area of responsibility. In addition, through long-term incentive programs, including stock options, we believe we have one of the lowest turnover levels in the industry for our local management teams. As a result of retaining experienced managers with extensive knowledge of and involvement in their local communities, we are proactive in anticipating our customers' needs and adjusting to changes in our markets. We also seek to implement the best practices of our various regions and areas throughout our operations to improve operating margins.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "(18) Stock Plans\nAs the Network Services Segment continued to grow throughout 1999, the Company's management began to divide the internal org a n i z a t i o n of the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e Sub-segments: 'Central European Sub-segment' (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), 'We s t e rn E u ropean Sub-segment' (including Germ a n y, France, and the United Kingdom) and 'Other Operations Sub-segment' (including the United States and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l re p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1, 2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of the Company's wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian operations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative S e rvices. Those assets are now shown under the Other Operations Sub-segment.\nThe following tables present the segment results of the Company's operations for the years ended December 31, 2000, 1999 and 1998.", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM\nWe consent to the incorporation by reference in the Registration Statements (Form S-8 Nos. 333-81801, 333-78125, 333-45542 and 333-104048) pertaining to the Republic Services 401(k) Plan, 1998 Stock Incentive Plan, Republic Services, Inc. Amended and Restated Employee Stock Purchase Plan, and Republic Services, Inc. Amended and Restated 1998 Stock Incentive Plan, respectively, of our reports dated February 24, 2005, with respect to the consolidated Ñnancial statements and schedule of Republic Services, Inc., Republic Services, Inc. management's assessment of the eÅectiveness of internal control over Ñnancial reporting, and the eÅectiveness of internal control over Ñnancial reporting of Republic Services, Inc., included in this Annual Report (Form 10-K) for the year ended December 31, 2004.\n/s/ ERNST & YOUNG LLP CertiÑed Public Accountants\nFort Lauderdale, Florida February 24, 2005\n96\nEXHIBIT 31.1", - "page_start": 102, - "page_end": 103, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "General\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or plant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy of the Company is to grow and diversify the business by adding services and geographic areas that can leverage the existing plant, but to do so within the opportunities and constraints presented by the industry. For many years the Company focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary business within the Company. This initial diversification was concentrated in other wireline businesses, such as the cable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in the wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of the regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the Company's total revenue was generated by wireline operations, and initiatives were already underway to make wireless a more significant contributor to total revenues.\nDuring the 1990's significant investments were made in the cellular and PCS (wireless) businesses. The VA 10 RSA cellular operation, in which the Company held a 66% interest and was the general partner, experienced rapid revenue growth and excellent margins in the late 1990's. The cellular operation covered only six counties, and became increasingly dependent on roaming revenues. Management believed the roaming revenues and associated margins would be unsustainable as other wireless providers increasingly offered nationally-branded services with significantly reduced usage charges. To position it to participate in the newer, more advanced, digital wireless services, in 1995 the Company entered the PCS business through an affiliation with American Personal Communications (APC), initiating service along the Interstate 81 corridor from Harrisonburg, Virginia to Chambersburg, Pennsylvania. This territory was a very close match to the Company's fiber network, thereby providing economic integration that might not be available to other wireless carriers. In 1999, the Company entered a new affiliation arrangement with Sprint, the successor to APC (which introduced the Company to a nationally-branded wireless service) and expanded the PCS footprint further into Central Pennsylvania. The Company's combined capital investment in 2000 and 2001 in the PCS operation was $45.1 million.\n39\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS", - "page_start": 40, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Corporate Headquarters\n110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301 Phone: (954) 769-2400 · Fax: (954) 769-2664 · www.republicservices.com\n©2005, RITM, LLC\nRepublic Services and Republic Services, Inc. names and logos are service marks of RITM, LLC", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "(18) Stock Plans\nP ro forma impact reflects only options granted since December 31, 1994. There f o re, the full impact of calculating compensation cost for stock options under SFAS No. 123 is not reflected in the pro forma amounts presented above because compensation cost is reflected over the options' vesting periods and compensation cost for options granted prior to January 1, 1995 is not considered.\nE u ronet and its subsidiaries operate in two business segments: (1) a segment that provides an independent shared ATM network and other e l e c t ronic payment network services to banks, retail and financial institutions (the 'Network Services Segment'); and (2) a segment that p roduces application software and solutions for payment and transaction delivery systems (the 'Software Solutions Segment'). These business segments are supported by a corporate service segment which provides corporate and other administrative services which are not d i rectly identifiable with the two business segments, (the 'Corporate Services Segment'). The accounting policies of each segment are the same as those described in the summary of significant accounting policies. The Company evaluates perf o rmance based on profit or loss fro m operations before income taxes not including nonre c u rring gains and net loss. Prior period segment information has been restated to conform to the current period's presentation.", - "page_start": 41, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "10. SEGMENT INFORMATION\nThe Company's operations are managed and evaluated through Ñve regions: Eastern, Central, Southern, Southwestern and Western. These Ñve regions are presented below as the Company's reportable segments. These reportable segments provide integrated waste management services consisting of collection, transfer and disposal of domestic non-hazardous solid waste.\nSummarized Ñnancial information concerning the Company's reportable segments for the respective years ended December 31 is shown in the following table:", - "page_start": 87, - "page_end": 87, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Regions\nEvery solution you build that runs in the AWS cloud will be deployed to at least one region.\n· Region - a physical location around the world where we cluster data centers\n· Availability Zone or \"AZ\" - one or more discrete data centers with redundant power, networking, and connectivity within a Region\n· Data center - a physical location that contains servers, data storage drives, and network equipment\nAWS cloud infrastructure\n13\nServerless\nDeveloper Guide\nAmazon has many regions all across the globe. Inside each region, there are one or more Availability Zones located tens of miles apart. The distance is near enough for low latency the gap between requesting and receiving a response, and far enough to reduce the chance that multiple zones are affected if a disaster happens.\nEach region is identified by a code, such as \"us-west-1\", \"us-east-1\" or \"eu-west-2\". Within each region, the multiple isolated locations known as Availability Zones or AZs are identified with the region code followed by a letter identifier. For example, us-east-1a . AWS handles deploying to multiple availability zones within a region for resilience.", - "page_start": 16, - "page_end": 17, - "source_file": "serverless-core.pdf" - }, - { - "text": "Resources\nResources are the AWS resources the action will act upon.\nAll AWS resources are identified by an Amazon Resource Name (ARN) . Because AWS services are deployed all over the world, ARNs function like an addressing system to precisely locate a specific component. ARNs have hierarchical structures:\narn:partition:service:region:account-id:resource-id\nFundamentals\n40\nServerless\nDeveloper Guide\narn:partition:service:region:account-id:resource-type/resource-id arn:partition:service:region:account-id:resource-type:resource-id\n· arn means this string is an ARN\n· partition is one of the three AWS partitions: AWS regions, AWS China regions, or AWS GovCloud (US) regions\n· service is the specific AWS service, for example: EC2\n· region is the AWS region, for example: us-east-1 (North Virginia)\n· account-id is the AWS account ID\n· resource-id is the unique resource ID. (Could also be in the form resource-type/ resource-id )", - "page_start": 43, - "page_end": 44, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": "What was one of the seminal moment of 2004 for MGM MIRAGE ?", - "target_page": 12, - "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "MGM MIRAGE 2004 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "ACHIEVING MOMENTOUS RESULTS\nRecently, we opened the SKYLOFTS, a new level of luxury for guests atop MGM Grand Las Vegas.\nWe'll follow the success of these new resort features with a category-defining new nightclub at The Mirage, two fabulous restaurants by Joël Robuchon at MGM Grand Las Vegas and gaming upgrades company-wide. Second, we are doubling down on Las Vegas by merging with Mandalay, a company we have long admired. The Mandalay merger represents a tremendous opportunity to build on the momentum established by Mike Ensign and his team. And third, we are dreaming of a not-so-distant future, when\nAL FACCINTO President, MGM MIRAGE International Marketing\nALAN FELDMAN Senior VP Public Affairs, MGM MIRAGE\nBRUCE GEBHARDT Senior VP, MGM MIRAGE Global Security\nWILLIAM J. HORNBUCKLE President & COO, MGM MIRAGE Europe\nPHYLLIS JAMES Senior VP & Senior Counsel, MGM MIRAGE\nProject CityCenter will literally redefine the Las Vegas Strip and change the face of Las Vegas forever.", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "No company is better positioned to help shape the future of Las Vegas than MGM MIRAGE.\nCYNTHIA KISER MURPHEY Senior VP, MGM MIRAGE Human Resources\nWILLIAM MCBEATH President, The Mirage\nROBERT V. MOON Chairman, MGM MIRAGE Marketing\nFELIX D. RAPPAPORT President, New York-New York\nPUNAM MATHUR Senior VP, MGM MIRAGE Diversity/Community Relations\ncombination of Mandalay's assets with our financial strength and industry-leading financial discipline will yield significant returns for all of our stakeholders.\nWe are currently planning the integration of the two companies, and over time, we expect to realize the full potential of cost and revenue synergies. We will report on our progress throughout the coming year.", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "MGM MIRAGE\n3600 Las Vegas Blvd South Las Vegas, NV 89109 1-702-693-7120 www.mgmmirage.com", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "ACHIEVING MOMENTOUS RESULTS\nJAMES J. MURREN President, CFO & Treasurer\nGAMAL AZIZ President, MGM Grand\nGLENN BONNER Senior VP & CIO, MGM MIRAGE Information Systems\nGEORGE R. BOYER III President, MGM Grand Detroit\nJOSEPH BRUNINI President, MGM Grand Resorts National Marketing\nJEFF DAHL President, Beau Rivage\no some, momentum is intangible - a product of fortune, a power that cannot be harnessed, and typically a short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are constantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence, a force which can be observed and measured, and something that can be a lasting and defining quality of a great company. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long been designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add value to our shareholders, we are able to redefine our Company's place in history every year - and 2004 was a defining time even by our exacting standards. T\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which we operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of our 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a record $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time record, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market observer, and significantly beat our forecasts. And 2004 will not be a zenith year for your company - rather, we expect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth and move forward to new defining moments.\nHow do we re-define a company that is already at the top of its industry? First, we continue to execute on our vision for our existing resorts - to continually evolve and increase the 'Wow!' factor for our guests. This strategy requires investment, and we will ensure that our resorts are not only world-class, but best-in-class. Examples include the beautiful Spa Tower at Bellagio and KÀ , the latest spectacular creation in collaboration with Cirque du Soleil.", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "MGM GRAND DETROIT\nPresident George Boyer epitomizes the company's commitment to corporate social responsibility. Boyer reads to a child at the Northwest Community Center in Detroit during an after-school mentoring program funded by the Voice Foundation.\nMGM MIRAGE supports a variety of programs to further educational aspirations of both students and employees, including tuition reimbursement for employees, scholarships for children of employees, and on-site GED, naturalization and English-asa-second-language (ESL) classes.\nGiving back to the communities in which MGM MIRAGE operates its businesses and where our employees live, work, and care for their families is a serious and dedicated commitment.\nMGM MIRAGE employee Christina Fuentes embraces a child during an event to benefit the Variety Day Home's Emergency Childcare Assistance Program in Las Vegas, one of the many programs supported by MGM MIRAGE to support the well-being of children. The program helps underwrite childcare assistance for low-income working parents.", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "DEFINING MOMENTS OF MGM MIRAGE\n96 19\nTHE NEW YORK-NEW YORK SKYLINE BECOMES\nA TOWERING PRESENCE IN THE PORTFOLIO. We acquired Primadonna Resorts to gain full ownership of the spectacular New York-New York as well as three hotel-casinos on the Nevada state line and two championship golf courses.\nIT ALL BEGINS WITH MGM GRAND. MGM Grand, the largest hotel-casino in the world, opened to great fanfare. 'The City of Entertainment' redefined the urban resort and provided the foundation for our company's momentous growth.\nBELLAGIO ADDS A JEWEL TO THE FAMILY CROWN. The Mirage Resorts merger provided outstanding resorts, people and land, and has propelled our earnings and provided an unparalleled platform for future growth.", - "page_start": 3, - "page_end": 4, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management's Evaluation\nManagement is responsible for establishing and maintaining adequate internal control over financial reporting for MGM MIRAGE (a Delaware corporation) and subsidiaries (the 'Company').", - "page_start": 48, - "page_end": 48, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Mandalay in Motion\nWe are incredibly excited to begin our journey with the talented people of Mandalay, as we work to maximize the value of Mandalay's instantly recognized brands and worldclass resorts. Long a fixture in Las Vegas, Mandalay's resorts will add to our premium portfolio and allow us to accelerate the pace of our growth. Our hotel people will be able to market a wider range of rooms and benefit from a world-class\nconvention center. Our casino marketing people will be able to offer their customers wonderful new amenities to expand our market reach. And our development people will be able to maximize the potential of priceless Las Vegas Strip land.\nThe Mandalay merger represents another defining moment for MGM MIRAGE, much like the Mirage Resorts transaction in 2000, at a time when Las Vegas is in a state of astounding metamorphosis. No company is better positioned to help shape the future of Las Vegas than MGM MIRAGE. We employ more people, invest more money and hold more prime real estate than any other company in Las Vegas. The\n15\n16\n(from left to right) ROBERT C. SELWOOD Senior Vice PresidentAccounting; JAMES J. MURREN President, CFO & Treasurer; BRYAN L. WRIGHT Senior Vice President - Assistant General Counsel & Assistant Secretary; DANIEL J. D'ARRIGO Senior Vice President-Finance", - "page_start": 24, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Defining Momentum in Our Family\nOur momentum is driven from within by acknowledging the contributions of each and every one of our employees, business partners and customers. Our commitment to diversity is recognition of the fact that in today's everchanging marketplace, we must reflect that which we see in the world around us.\nThis commitment should be seen as a commonsense business decision. That said, we are proud of the recognition our Diversity program has received, including accolades from prestigious media such as Fortune and DiversityInc. magazines.\nSince formalizing our program only four years ago, we've made enormous strides. There is still progress to be made and your company has the momentum to remain at the forefront on diversity initiatives, providing yet another advantage for sustaining performance in the long term.\nSENSI BELLAGIO An eclectic menu features diverse cuisines in an earthy arena replete with waterfalls and chrome. A bold wine list complements Chef Martin Heierling's sumptuous work.\nJEAN-PHILIPPE PATISSERIE BELLAGIO A mesmerizing fountain of cascading liquid chocolate showcases a splendid selection of chocolates, cakes, crêpes, salads and sandwiches.\nISLA TI Designed by Jeffrey Beers, Isla brightens all the senses. Chef Richard Sandoval gives an innovative and modern interpretation of traditional Mexican cuisine.\n(from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": " What are the most significant piece of undeveloped land remaining on the Las Vegas Strip ?", - "target_page": 21, - "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "SETTING THE FUTURE IN MOTION\nRESIDENTIAL In lofts, brownstones and high-rise buildings, residential options abound to populate the new city and energize the surrounding areas.\nENTERTAINMENT From street performers to Broadway shows, our entertainment will evoke the best of New York or London.\ne have been working for some time on conceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip. We certainly could have come up with a spectacular casino-hotel. But, the truth is, Las Vegas is ready for so much more. W\nAs the city eclipses two million residents on its way to passing three million by the end of the decade, and with land prices on the Strip soaring, it has become clear that there is a much better and higher use for this location. As Las Vegas marks its Centennial, Project CityCenter stands as a defining moment for development in this fabled city.\nProject CityCenter represents a new era of the urban complex, one that encompasses tourism, entertainment, gaming, retail and residential elements. Only MGM MIRAGE has the momentum - financially, intellectually and professionally - to effectively develop such a project.\nThe signature building within Project CityCenter is the 4,000-room hotel-casino. The internationally acclaimed architect Cesar Pelli has been commissioned to design this iconic structure. Pelli's initial concept drawing defines a new generation of urban landscape for the Las Vegas Strip, one which includes gaming at its economic center but not as an emotional centerpiece.\nProject CityCenter will provide the momentum for the next era of amazing growth for your company and Las Vegas.\nTHE SITE Located in the heart of the Las Vegas Strip, Project CityCenter will dwarf every development that preceded it. Its 66 acres will include a 4,000-room hotel-casino and three boutique hotels.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Overall Outlook\nWe have invested heavily in our existing operations in 2003 and 2004, and expect to continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require ongoing capital investment to maintain their competitive advantages. We believe the investments in additional non-gaming amenities we made in 2003 and 2004 have enhanced our ability to generate increased visitor volume and allowed us to charge premium prices for our amenities.\nThe most likely significant factors affecting operating results at our existing resorts in 2005 will be the expected continued strength of the leisure and convention travel segments, the expansion of Bellagio and the opening of KÀ and other amenities at MGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las Vegas Strip. Various lodging market observers, such as PricewaterhouseCoopers and Smith Travel Research, are forecasting mid-single digit percentage growth in REVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR growth, and REVPAR growth in Las Vegas in general, has outpaced that of the national market, and we expect that trend to continue.\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort's room base. In addition, we added new meeting, retail and dining space and significantly expanded the spa and salon. KÀ opened in late November 2004 at MGM Grand Las Vegas, which had been without a featured production show for almost two years. Along with the numerous restaurant and other entertainment additions at MGM Grand Las Vegas, KÀ will enhance our ability to generate visitor traffic and capture a greater share of our guests' spending.\nWynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700 rooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will also feature numerous upscale restaurants and generally target customers who might otherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the breadth of amenities in our portfolio of resorts and our loyalty and other marketing programs will help minimize these competitive pressures. The proximity of Wynn Las Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the Fashion Show Mall and Venetian, will also benefit these resorts.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "RESULTS OF OPERATIONS\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts and 50% investments in two other casino resorts, including:\nLas Vegas, Nevada:\nOther:\nBellagio, MGM Grand Las Vegas, The Mirage, TI, New YorkNew York, Boardwalk, and Monte Carlo (50% owned).\nThe Primm Valley Resorts (Buffalo Bill's, Primm Valley Resort and Whiskey Pete's) in Primm, Nevada; Beau Rivage in Biloxi, Mississippi; MGM Grand Detroit; Borgata (50% owned) in Atlantic City, New Jersey.\nWe operate in one segment, the operation of casino resorts, which includes offering gaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over half of our net revenues are derived from gaming activities, a lower percentage than many of our competitors, as our operating philosophy is to provide a complete resort experience for our guests, including non-gaming amenities which command premium prices based on their quality.\nWe generate a majority of our net revenues and operating income from our Las Vegas Strip resorts. In 2004, over 75% of our net revenues and operating income was generated by wholly-owned Las Vegas Strip resorts. We believe that we own the premier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to continually reinvest in these resorts to maintain that competitive advantage. Our concentration on the Las Vegas Strip exposes us to certain risks outside of our control, such as competition from other Las Vegas Strip resorts as well as new or expanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, and the impact from potential expansion of gaming in California. This concentration also exposes us to risks related to tourism and the general economy, including national and global economic conditions and terrorist attacks or other global events.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "The Next Moment - A City is Born\nWhat makes a great city? Las Vegas has long been recognized as the leisure capital of the world. The resorts in our valley have been the innovative leaders in the hospitality industry and have driven the tremendous growth in visitor volume, high occupancy rates and surging food, beverage, entertainment and gaming volumes. But there is another Las Vegas - a community of two million residents on its way to three million by the end of the decade. Las Vegas is leading the U.S. migration to the Southwest. Our newcomers are attracted by the lifestyle, weather, cost of living and economic opportunity. Many have come from cities in the East, West and Midwest and take elements of established communities for granted, such as medical, educational and cultural excellence and diversity.\nThe people of Las Vegas today have great aspirations and\nexpect and demand more of our community. We are a city without a proper city, and that is about to change. Ambitious plans are underway to revitalize Downtown Las Vegas, centered around a beautiful performing arts center and an academic medical center; UNLV is in the midst of a major capital campaign to enhance the Midtown section of Las Vegas; and your company has embarked on the most comprehensive project to date - Project CityCenter, at the heart of the Las Vegas Strip.\nThe Las Vegas Strip has no sense of city now - but we believe it can. The future of Las Vegas is centered around our great resorts and our future development. There are many reasons we believe Project CityCenter is the right project for our Las Vegas Strip development. We believe there is a social imperative that Las Vegas mature as a city, not just a conglomeration of suburbs. A city deserves a center - a center for living, working and playing. We want to be an integral part in defining the Las Vegas of the future.\nAnd there is a business motivation. Companies in the gaming industry have historically not been valued on par with other hospitality companies and mixed-use real estate companies. We plan to break out of the gaming mold, and define a company based on extensive holdings in multiple businesses. Project CityCenter will include major residential, retail and entertainment components. We will partner with boutique\nSCOTT SIBELLA President, TI\nhotel, retail and residential companies, companies previously serving only major urban hubs. And CityCenter will ensure the greatest possible return on our investment on this Las Vegas Strip land.", - "page_start": 25, - "page_end": 26, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "TO OUR SHAREHOLDERS\nBELLAGIO underwent a significant expansion during 2004 resulting in the opening of the Spa Tower and several important new amenities at this AAA Five Diamond property. Bellagio remains Las Vegas' first and only hotel-casino to receive this prestigious recognition. These new additions add dimension and depth to the world-famous experience awaiting guests at Bellagio.\nMGM GRAND LAS VEGAS completed a transformation, begun in 2003, of its food and beverage and entertainment offerings. MGM Grand is one of the must-see attractions of Las Vegas, with Cirque du Soleil's newest production, KA ' TM , and several of the Strip's finest restaurants and hottest nightspots. 18 .0 %\nTI 's transformation was no less extensive, as the property's management team conceived and implemented a program to enliven the property with new restaurants and nightlife.\nTHE MIRAGE was the site of a revolution in Las Vegas' history as the venerable buffet was given new life as a top dining establishment, Cravings. Others may follow this lead, but The Mirage was the first property to breathe new life into what remained of the last bastion of 'old' Las Vegas.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "MGM MIRAGE\n3600 Las Vegas Blvd South Las Vegas, NV 89109 1-702-693-7120 www.mgmmirage.com", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Mandalay in Motion\nWe are incredibly excited to begin our journey with the talented people of Mandalay, as we work to maximize the value of Mandalay's instantly recognized brands and worldclass resorts. Long a fixture in Las Vegas, Mandalay's resorts will add to our premium portfolio and allow us to accelerate the pace of our growth. Our hotel people will be able to market a wider range of rooms and benefit from a world-class\nconvention center. Our casino marketing people will be able to offer their customers wonderful new amenities to expand our market reach. And our development people will be able to maximize the potential of priceless Las Vegas Strip land.\nThe Mandalay merger represents another defining moment for MGM MIRAGE, much like the Mirage Resorts transaction in 2000, at a time when Las Vegas is in a state of astounding metamorphosis. No company is better positioned to help shape the future of Las Vegas than MGM MIRAGE. We employ more people, invest more money and hold more prime real estate than any other company in Las Vegas. The\n15\n16\n(from left to right) ROBERT C. SELWOOD Senior Vice PresidentAccounting; JAMES J. MURREN President, CFO & Treasurer; BRYAN L. WRIGHT Senior Vice President - Assistant General Counsel & Assistant Secretary; DANIEL J. D'ARRIGO Senior Vice President-Finance", - "page_start": 24, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "NOTE 1 - ORGANIZATION\nMGM MIRAGE (the 'Company'), formerly MGM Grand, Inc., is a Delaware corporation, incorporated on January 29, 1986. As of December 31, 2004 approximately 58% of the outstanding shares of the Company's common stock were owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk Kerkorian. MGM MIRAGE acts largely as a holding company and, through wholly-owned subsidiaries, owns and/or operates casino resorts.\nThe Company owns and operates the following casino resorts on the Las Vegas Strip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure Island ('TI'), New York-New York and the Boardwalk Hotel and Casino. The Company owns a 50% interest in the joint venture that owns and operates the Monte Carlo Resort & Casino, also located on the Las Vegas Strip.\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state line - Whiskey Pete's, Buffalo Bill's and the Primm Valley Resort - as well as two championship golf courses located near the resorts. The Company also owns Shadow Creek, an exclusive world-class golf course located approximately ten miles north of its Las Vegas Strip resorts.\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc., and its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino and entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC operates a casino in an interim facility in downtown Detroit. See Note 10 for discussion of the revised development agreement with the City of Detroit and plans for a permanent casino resort.\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi, Mississippi. The Company also owns a 50% interest in a limited liability company that owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area\nof Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of Borgata and also operates the resort. Borgata opened in July 2003. The Company owns approximately 95 developable acres adjacent to Borgata, a portion of which consists of common roads, landscaping and master plan improvements which the Company designed and developed as required under the agreement with Boyd.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "MGM Grand Las Vegas\n3799 Las Vegas Blvd South Las Vegas, NV 89109 1-702-891-1111\nReservations\n1-702-891-7777\n1-800-929-1111\nwww.mgmgrand.com", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "The Boardwalk Hotel & Casino\n3750 Las Vegas Blvd South Las Vegas, NV 89109\n1-702-735-2400 Reservations 1-800-635-4581 www.boardwalklv.com", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": "Which events negatively impacted leisure travel and MCM Mirage high-end gaming business in late 2002 and early 2003 ?", - "target_page": 32, - "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "MGM MIRAGE 2004 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "ACHIEVING MOMENTOUS RESULTS\nRecently, we opened the SKYLOFTS, a new level of luxury for guests atop MGM Grand Las Vegas.\nWe'll follow the success of these new resort features with a category-defining new nightclub at The Mirage, two fabulous restaurants by Joël Robuchon at MGM Grand Las Vegas and gaming upgrades company-wide. Second, we are doubling down on Las Vegas by merging with Mandalay, a company we have long admired. The Mandalay merger represents a tremendous opportunity to build on the momentum established by Mike Ensign and his team. And third, we are dreaming of a not-so-distant future, when\nAL FACCINTO President, MGM MIRAGE International Marketing\nALAN FELDMAN Senior VP Public Affairs, MGM MIRAGE\nBRUCE GEBHARDT Senior VP, MGM MIRAGE Global Security\nWILLIAM J. HORNBUCKLE President & COO, MGM MIRAGE Europe\nPHYLLIS JAMES Senior VP & Senior Counsel, MGM MIRAGE\nProject CityCenter will literally redefine the Las Vegas Strip and change the face of Las Vegas forever.", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "(In thousands)\nAs a result of the above trends, our net revenues increased 10% in 2004, while increasing only 3% in 2003. Net revenues at MGM Grand Las Vegas increased 14% in 2004, due to the addition of several new restaurants, bars and other amenities, and in spite of fewer rooms in service due to room remodel activity. Net revenues at New York-New York increased 26% as the resort continues to benefit from Zumanity and Nine Fine Irishmen, both of which opened in summer 2003. Net revenues at The Mirage decreased 2% as the resort was without the Siegfried & Roy show and the buffet was closed for a portion of the year while Cravings was constructed.\nOur operating income in 2004 increased 36%, due primarily to the strong revenue trends and a full year of Borgata's results. The increase in income from unconsolidated affiliates is responsible for approximately one-third of the increase in operating income, while improvements at our operating resorts, particularly Bellagio, MGM Grand Las Vegas and New York-New York, make up the rest of the increase. Operating income at MGM Grand Detroit was essentially flat year-overyear, despite an increase in the gaming tax rate from 18% to 24% effective September 2004. Several other factors largely offset: Higher corporate expense due to increased development costs; lower bad debt expense due to improved collections; lower preopening expenses due to Borgata preopening expenses in 2003; and higher property transactions, net due to a $37 million gain on sale of land in 2003.\nIn 2003, our operating income decreased by 6%. While revenues grew especially in the second half of 2003, expense growth, particularly in payroll, outpaced revenues.\nTable games revenues increased as a result of the improvements in the U.S. economy and the general economy worldwide, as well as increased attendance at targeted marketing events, including the New Years period. Total table games volume for the year was up 9%, with particular strength in baccarat volume, up 18%. These are the most significant increases in table games volumes since 2000. Table games revenues decreased in 2003, as a slightly lower hold percentage and the impact of the Iraq war and SARS outbreak in early 2003 were not fully offset by strong volume levels over the latter half of 2003. Table games win percentages were within our normal range for all periods presented.", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "RESULTS OF OPERATIONS\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts and 50% investments in two other casino resorts, including:\nLas Vegas, Nevada:\nOther:\nBellagio, MGM Grand Las Vegas, The Mirage, TI, New YorkNew York, Boardwalk, and Monte Carlo (50% owned).\nThe Primm Valley Resorts (Buffalo Bill's, Primm Valley Resort and Whiskey Pete's) in Primm, Nevada; Beau Rivage in Biloxi, Mississippi; MGM Grand Detroit; Borgata (50% owned) in Atlantic City, New Jersey.\nWe operate in one segment, the operation of casino resorts, which includes offering gaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over half of our net revenues are derived from gaming activities, a lower percentage than many of our competitors, as our operating philosophy is to provide a complete resort experience for our guests, including non-gaming amenities which command premium prices based on their quality.\nWe generate a majority of our net revenues and operating income from our Las Vegas Strip resorts. In 2004, over 75% of our net revenues and operating income was generated by wholly-owned Las Vegas Strip resorts. We believe that we own the premier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to continually reinvest in these resorts to maintain that competitive advantage. Our concentration on the Las Vegas Strip exposes us to certain risks outside of our control, such as competition from other Las Vegas Strip resorts as well as new or expanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, and the impact from potential expansion of gaming in California. This concentration also exposes us to risks related to tourism and the general economy, including national and global economic conditions and terrorist attacks or other global events.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Return on Equity\nRevenues, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = $ 62,803. Revenues, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = $ 59,533. Revenues, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = $ 57,605. Cost of Goods Sold, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 40,564. Cost of Goods Sold, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 39,236. Cost of Goods Sold, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 35,777. Gross Profit, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 22,239. Gross Profit, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 20,297. Gross Profit, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 21,828. Operating Expenses:, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = . Operating Expenses:, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = . Operating Expenses:, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = . Selling, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 5,594. Selling, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 5,343. Selling, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 6,248. General and administrative, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 7,576. General and administrative, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 6,992. General and administrative, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 7,849. Research and development, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 2,146. Research and development, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 2,180. Research and development, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 1,911. , FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 15,316. , FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 14,515. , FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 16,008. Operating Income, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 6,923. Operating Income, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 5,782. Operating Income, FOR THE YEAR ENDED DECEMBER 31, 2003 2002 2001 = 5,820. Interest Income, FOR THE YEAR ENDED DECEMBER 31, 2003 2002", - "page_start": 9, - "page_end": 9, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\n4,274. Traffic sensitive (1), 2003 2003..Terminating Terminating = $ 4,974. Traffic sensitive (1), 2002 2002.2002.Originating Originating Originating = $ 4,676 $ 4,676. Traffic sensitive (1), 2002 2002..Terminating Terminating Terminating = $ 3,976 $ 3,976. Special access revenues, 2003 2003..Originating Originating = 1,606. Special access revenues, 2003 2003..Terminating Terminating = 1,606. Special access revenues, 2002 2002.2002.Originating Originating Originating = 1,247 1,247. Special access revenues, 2002 2002..Terminating Terminating Terminating = 1,247 1,247. Carrier common line settlement, 2003 2003..Originating Originating = 5,750. Carrier common line settlement, 2003 2003..Terminating Terminating = 5,750. Carrier common line settlement, 2002 2002.2002.Originating Originating Originating = 4,978 4,978. Carrier common line settlement, 2002 2002..Terminating Terminating Terminating = 4,978 4,978. Total, 2003 2003..Originating Originating = $ 11,630. Total, 2003 2003..Terminating Terminating = $ 12,330. Total, 2002 2002.2002.Originating Originating Originating = $ 10,901 $ 10,901. Total, 2002 2002..Terminating Terminating Terminating = $ 10,201 $ 10,201\n(1) Traffic sensitive revenue has been normalized in the proforma column to remove the impact of the access billing dispute adjustment and the impact of the NECA settlement adjustments.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n46\nFacility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease was primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the economic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber route to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides increased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company's fiber network to additional market locations but to date has not added additional revenue to the Company's operation.", - "page_start": 47, - "page_end": 48, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Market and Dividend Information\nThe Company's Class A Common Stock is traded in the over-the-counter market and is quoted on the National Association of Securities Dealers Automated Quotation (NASDAQ) National Market System under the symbol EMMS.\nThe following table sets forth the high and low bid prices of the Class A Common Stock for the periods indicated. No dividends were paid during any such periods.\nMay 2002, High = 31.85. May 2002, Low = 26.15. August 2002, High = 30.15. August 2002, Low = 11.65. November 2002, High = 24.05. November 2002, Low = 14.25. February 2003, High = 24.86. February 2003, Low = 17.82. May 2003, High = 21.24. May 2003, Low = 14.84. August 2003, High = 23.87. August 2003, Low = 18.68. November 2003, High = 24.06. November 2003, Low = 18.00. February 2004, High = 28.65. February 2004, Low = 22.74\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A Common Stock and one record holder of the Class B Common Stock.\nEmmis intends to retain future earnings for use in its business and does not anticipate paying any dividends on shares of its common stock in the foreseeable future.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "No company is better positioned to help shape the future of Las Vegas than MGM MIRAGE.\nCYNTHIA KISER MURPHEY Senior VP, MGM MIRAGE Human Resources\nWILLIAM MCBEATH President, The Mirage\nROBERT V. MOON Chairman, MGM MIRAGE Marketing\nFELIX D. RAPPAPORT President, New York-New York\nPUNAM MATHUR Senior VP, MGM MIRAGE Diversity/Community Relations\ncombination of Mandalay's assets with our financial strength and industry-leading financial discipline will yield significant returns for all of our stakeholders.\nWe are currently planning the integration of the two companies, and over time, we expect to realize the full potential of cost and revenue synergies. We will report on our progress throughout the coming year.", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Restructuring costs (credit) consisted of the following:\n. . . . . . . . . . . . . . . . . . . . . . . . . . ., 2002 = -. Other net losses on asset sales or disposals . . . . . . ., 2004 = 1,135. Other net losses on asset sales or disposals . . . . . . ., 2003 = 4,049. Other net losses on asset sales or disposals . . . . . . ., 2002 = -. , 2004 = $ 8,665. , 2003 = $ (18,941). , 2002 = $ 14,712\nIn 2004, there were no material unusual property transactions. In 2003, we sold 315 acres of land in North Las Vegas, Nevada near Shadow Creek for approximately $55 million, resulting in the $37 million gain reflected above. Prior to 2003, we classified gains and losses on routine assets sales or disposals as a non-operating item at some resorts and as an operating item at other resorts. We believe the preferable presentation of these items is as an element of operating income. Prior period statements have not been reclassified as such transactions were not material in periods prior to 2003. Until 2003, demolition costs were typically capitalized as part of new construction. We began expensing demolition costs on major construction projects as incurred on January 1, 2003, and are accounting for this change in policy prospectively. Demolition costs were not material in periods prior to 2003. Demolition costs in 2004 and 2003 related primarily to preparation for the Bellagio standard room remodel, Bellagio expansion and new theatre at MGM Grand Las Vegas. Impairments of assets to be disposed of in 2003 consisted primarily of assets related to the former EFX! show and restaurants closed during 2003 at MGM Grand Las Vegas.\nIn 2002, Tropical Storm Isidore caused property damage at Beau Rivage totaling $8 million, including clean-up costs. The amount of the write-down for damaged assets was determined based on the net book value of the assets and engineering estimates. In connection with the revised development agreement in Detroit, we wrote off $5 million, which was the net book value of previously incurred development costs associated with the riverfront permanent casino site ($9 million), offset by previously accrued obligations no longer required under the revised development agreement ($4 million).", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Years Ended December 31, 2004, 2003 and 2002\nCost of Operations. Cost of operations was $1,714.4 million, $1,605.4 million and $1,472.9 million, or, as a percentage of revenue, 63.3%, 63.8% and 62.3%, for the years ended December 31, 2004, 2003 and 2002, respectively.\n35\nThe increase in aggregate dollars in all periods presented is primarily a result of the expansion of our operations through internal growth and acquisitions.\nThe increase in cost of operations as a percentage of revenue from 2002 to 2003 and the decrease in cost of operations as a percentage of revenue from 2003 to 2004 is primarily attributable to higher self-insurance expense in 2003. Self-insurance expense was $165.3 million, $189.5 million and $138.1 million for the years ended December 31, 2004, 2003 and 2002, respectively. The increase in self-insurance expense in 2003 related to existing claims and was attributable to the expansion of our operations and various changes in estimates as a result of continued negative trends through the 2003 policy year.\nExcluding self-insurance expense, cost of operations as a percentage of revenue increased during the year ended December 31, 2004 versus the comparable 2003 period. This increase is primarily attributable to increased fuel prices, labor costs and subcontracting costs associated with the long-haul transport of waste by third-party vendors. Excluding self-insurance expense, cost of operations as a percentage of revenue decreased in 2003 versus the comparable 2002 period due to the elimination of closure and post-closure expense as a component of cost of operations in accordance with SFAS 143 in 2003 and the termination of our operating lease facility in July 2002. This decrease was partially oÅset by increased fuel prices, an increase in waste taxes levied on landÑll volumes in certain states, an increase in revenue generated by lines of business that produce lower operating margins and an increase in the long-haul transport of waste by third-party vendors.\nTo date in 2005, we have experienced a signiÑcant increase in fuel prices. We believe that cost of operations as a percentage of revenue may continue to remain high depending upon the cost of fuel, health insurance, risk insurance and other key components of our cost structure and general economic conditions.", - "page_start": 42, - "page_end": 43, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What possess all naval aviators ?", - "target_page": 5, - "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "PREFACE\nThe purpose of this textbook is to present the elements of applied aerodynamics and aeronautical engineering which relate directly to the problems of flying operations. All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. Due .to the increasing complexity of modern aircraft, this natural interest must be applied to develop a sound understanding of basic engineering principles and an appreciation of some of the more advanced problems of aerodynamics and engineering. The safety and effectiveness of flying operations will depend greatly on the understanding and appreciation of how and why an airplane flies. The principles of aerodynamics will provide the foundations for developing exacting and precise flying techniques and operational procedures.\nThe content of this textbook has been arranged to provide as complete as possible a reference for all phases of flying in Naval Aviation. Hence, the text material is applicable to the problems of flight training, transition training, and general flying operations. The manner of presentation throughout the text has been designed to provide the elements of both theory and application and will allow either directed or unassisted study. As a result, the text material'will be applicable to supplement formal class Iectures and briefings and provide reading material as a background for training and flying operations.\nMuch of the specialized mathematical detail of aerodynamics has been omitted wherever it was considered unnecessary in the field of flying operations. Also, many of the basic assumptions and limitations of certain parts of aerodynamic theory have been omitted for the sake of simplicity and clarity of presentation. In order to contend with these specific shortcomings, the Naval Aviator should rely on the assistance of certain specially qualified individuals within Naval Aviation. For example, graduate aeronautical engineers, graduates of the Test Pilot Training School at the Naval Air Test Center, graduates of the Naval Aviation Safety Officers Course, and technical representatives of the manufacturers are qualified to assist in interpreting and applying the more difficult parts of aerodynamics and aeronautical engineering. To be sure, the specialized qualifications of these individuals should be utilized wherever possible.\niii", - "page_start": 4, - "page_end": 4, - "source_file": "00-80T-80.pdf" - }, - { - "text": "APPLICATION OF AERODYNAMICS TO SPECIFBC PROW OF FLYING\nWhile the previous chapters have presented the detailed parts of the general field of aerodynamics, there remain various problems of flying which require the application of principles from many parts of aerodynamics. The application of aerodynamics to these various problems of flying will assist the Naval Aviator in understanding these problems and developing good flying techniques.\n349", - "page_start": 366, - "page_end": 366, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Chapter 1 BASIC AERODYNAMKS\nIn order to understand the characteristics of his aircraft and develop precision flying techniques, the Naval Aviator must be familiar with the fundamentals of aerodynamics. There are certain physical laws which describe the behavior of airflow and define the various aerodynamic forces and moments acting on a surface. These principles of aerodynamics provide the foundations for good, precise flying techniques.", - "page_start": 18, - "page_end": 18, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS OO-BOT-80 BASIC AE,RODYNAMlCS\nThe airplane drag curve is a major factor in many items of airplane performance. Range, endurance, climb, maneuver, landing, takeoff, etc., performance are based on some relationship involving the airplane drag curve.\n95\nNAVWEPS 00-8OT-80 AIRPLANE PERFORMANCE\nThe performance of an aircraft is. the most important feature which defines its suitability for specific missions. The principal items of airplane performance deserve detailed consideration in order to better understand and appreciate the capabilities of each airplane. Knowledge of the various items of airplane performance will provide the Naval Aviator with a more complete appreciation of the\noperating limitations and insight to obtain the design performance of his aircraft. The performance section of the flight handbook provides the specific information regarding the capabilities and limitations of each airplane. Every Naval Aviator must rely upon these handbook data as the guide to safe and effecrive operation of his aircraft.", - "page_start": 111, - "page_end": 112, - "source_file": "00-80T-80.pdf" - }, - { - "text": "OPERATING STRENGTH LIMITATIONS\nThe weight of the structural components of an aircraft is an extremely important factor in the development of an efficient aircraft configuration. In no other field of mechanical design is there such necessary importance assigned to structural weight. The efficient aircraft and powerplant structure is the zenith of highly reined rknimum weight design. in\norder to obtain the required service life from his aircraft, the Naval Aviator must undetstand, appreciate, and observe the operating strength limitations. Failure to do so will incur excessive maintenance costs and a high incidence of failure during the service life of an aircraft.\n325", - "page_start": 342, - "page_end": 342, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 HIGH SPEED AERODYNAMICS\nChapter 3 HIGH SPEED AERODYNAMICS\nDevelopments in aircraft and powerplants have produced high performance airplanes with capabilities for very high speed flight. The study of aerodynamics at these very high flight speeds has many significant differences from the study of classical low speed aerodynamics. Therefore, it is quite necessary that the Naval Aviator be familiar with the nature of high speed airflow and the characteristics of high performance airplane configurations.", - "page_start": 218, - "page_end": 218, - "source_file": "00-80T-80.pdf" - }, - { - "text": "AERODYNAMICS FOR NAVAL AVIATORS\nUSAF AC'flVITlES-In accordance with Technical Order No. 00-5-1. NA VY ACTIVmE~UJe DO FORM U'\" and fllbmit in accordance with the inKruC:JiODi contained in NAVSUP PUB› LICATION -4'7-Military Standard Requilitioning and Issue Procedures. Fot information on othtl' available maurW Ind details of distribution refer to NAVSUP PUBLICATION 2002 SECTION VIII, PART c .. d NAVAIR OO·IOOA. '\nNAVAIR", - "page_start": 1, - "page_end": 1, - "source_file": "00-80T-80.pdf" - }, - { - "text": "THE FLIGHT HANDBOOK\nFor the professional aviator, there are few documents which are as important as the airplane flight handbook. The information and data contained in the various sections of the flight handbook provide the basis for safe and effective operation of the airplane.\nVarious sections of the flight handbook are devoted to the following subjects:\n(1) Equipment and Systems. With the mechanical complexity of the modern airplane, it is imperative that the pilot be familiar with every item of the aircraft. Only through exact knowledge of the equipment can the pilot properly operate the airplane and contend with malfunctions.\n(2) Operating Procedures. Good procedures are mandatory to effect safe operation of the airplane and its equipment. The complexity of modern equipment dictates the use of special and exact procedures of operation and any haphazard or non-standard procedure is an", - "page_start": 428, - "page_end": 428, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 PREFACE\nThe majority of aircraft accidents are due to some type of error of the pilot. This fact has been true in the past and, unfortunately, most probably will be true in the future. Each Naval Aviator should strive to arm himself with knowledge, training, and exacting, professional attitudes and techniques. The fundamentals of aerodynamics as presented in this text will provide the knowledge and background for safe and effective flying operations. The flight handbooks for the aircraft will provide the particular techniques, procedures, and operating data which are necessary for each aircraft. Diligent study and continuous training are necessary to develop the professional skills and techniques for successful flying operations.\nThe author takes this opportunity to express appreciation to those who have assisted in the preparation of the manuscript. In particular, thanks are due to Mr. J. E. Fairchild for his assistance with the portions dealing with helicopter aerodynamics and roll coupling phenomena. Also, thanks are due to Mr. J. F. Detwiler and Mr. E. Dimitruk for their review of the text material.\nHUGH HARRISON HURT, Jr.\nAugust 1959 University of Southern California Los Angelesj Cnlif.\niv\nNAVWEPS OO-801-8O TABLE OF CONTENTS\nTABLE OF CONTENTS", - "page_start": 5, - "page_end": 6, - "source_file": "00-80T-80.pdf" - }, - { - "text": "SPINS AND PROBLEMS OP SPIN RECOVERY\nThe motion of an airplane in a spin can involve many complex aerodynamic and inertia forces and moments. However, there are certain fundamental relationships regarding spins and spin recoveries with which all aviators should be familiar. The spin differs from a spiral dive in that the spin always involves flight at high angle of attack while the spiral dive involves a spiral motion of the airplane at relatively low angle of attack.\nThe stall characteristics and stability of the airplane at high lift coefficients are important in the initial tendencies of the airplane. As previously mentioned, it is desirable to have the wing initiate stall at the root first rather than tip first. Such a stall pattern prevents the undesirable rolling moments at high lift coeGients, provides suitable stall\nwarning, and preserves lateral control effectiveness at high angles of attack. Also, the airplane must maintain positive static longitudinal stability at high lift coe&ients and should demonstrate satisfactory stall recovery characteristics.\nIn order to visualize the principal effects of an airplane entering a spin, suppose the airplane is subjected to the rolling and yawing velocities shown in figure 4.32. The yawing velocity to the right tends to produce higher local velocities on the left wing than on the right wing. The rolling velocity tends to increase the angle of attack for the downgoing right wing (a,) and. decrease the angle of attack for the upgoing left wing (al). At airplane angles of attack below the stall this relationship produces roll due to yaw, damping in roll, etc., and some related motion of the airplane in unstalled flight. However, at angles of attack above the stall, important changes take place in the aerodynamic characteristics.", - "page_start": 324, - "page_end": 326, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What is the static pressure of the aire at standard sea level ?", - "target_page": 20, - "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "NAVWEe3 OO-BOT-80 BASIC AERODYNAMICS\npercent water vapor, argon, carbon dioxide, etc. For the majority of all aerodynamic considerations air is considered as a uniform mixture of these gases. The usual quantities used to define the properties of an air mass are as follows:\nSTATIC PRESSURE. The absolute static pressure of the air is a property of primary importance. The static pressure of the air at any altitude results from the mass of air supported above that level. At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) and at 40,000 feet altitude this static pressure decreases to approximately 19 percent of the sea level value. The shorthand notation for the ambient static pressure is 'p' and the standard sea level static pressure is given the subscript 'a' for zero altitude, pa. A more usual reference in aerodynamics and performance is the proportion of the ambient sta~tic pressure and the standard sea level static pressure. This static pressure ratio is assigned the shorthand notation of 8 (delta).\nAltitude pressure ratio\nAmbient static pressure =Standard sea level static pressure 6 = PIP0\nMany items of gas turbine engine performance are directly related to some parameter involving the altitude pressure ratio.\nTEMPERATURE. The absolute temperacure of the air is another important property. The ordinary temperature measurement by the Centigrade scale has a/datum at the freezing point of water but absolute zero temperature is obtained at a temperature of -273' Centigrade. Thus, the standard sea level tcmperature of 15' C. is an absolute temperature of 288'. This scale of absolute temperature using the Centigrade increments is the Kelvin scale, e.g., o K. The shorthand notation for the ambient air temperature is 'T' and the standard sea level air temperature of 288' K. is signified by Ta. The more usual reference is,\n2\nthe proportion of the ambient air temperature and the standard sea level air temperature. This temperature ratio is assigned the shorthand notation of 0 (theta).\nTemperature ratio", - "page_start": 19, - "page_end": 19, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\nAIRSPEED MEASUREMENT. If a symmetrically shaped object were placed in a moving airstream, the flow pattern typical of figure 1.4 would result. The airstream at the very nose of the object would stagnate and the relative flow velocity at this point would be zero. The airflow ahead of the object possesses some certain dynamic pressure and ambient static pressure. At the very nose of the object the local velocity will drop to zero and the airstream dynamic pressure will be converted into an increase in static pressure at the stagnation point. In other words, there will exist a static pressure at the stagnation point which is equal to the airstream total pressure-ambient static pressure plus dynamic pressure.\nAround the surface of the object the airflow will divide and the local velocity will increase from zero at the stagnation point to some maximum on the sides of the object. If friction and viscosity effects are neglected, the\nNAVWEPS OO-EOT-80 BASIC AERODYNAMICS\nAIRSTREAM AHEAD HAS AMBIENT STATIC PRESSURE AND DYNAMIC PRESSURE\nSTAGNATION PRESSURE IS AIRSTREAM TOTAL PRESSURE P+q\nFtgure 1.4. Flow Pattern on a Symmetrical Object\nsurface anflow continues to the aft stagnation point where the local velocity is again zero. The important point of this example of aerodynamic flow is existence of the stagnation point. The change in airflow static pressure which takes place at the stagnation point IS equal to the free stream dynamic pressure, q.\nThe measurement of free stream dynamic pressure is fundamental to the indication of airspeed. In fact, airspeed indicators are simply pressure gauges which measure dynamic pressure related to various airspeeds. Typical airspeed measuring systems are illustrated in figure 1.5. The pitot head has no internal flow velocity and the pressure in the pitot tube is equal to the total pressure of the airstream. The purpose of the static-ports is to sense the true static pressure of the free airstream. The total pressure and static pressure lines are attached to a differential pressure gauge and the net pressure indicated is the dynamic\npressure, q. The pressure gauge is then calibrated to indicate flight speed in the standard sea level air mass. For example, a dynamic pressure of 305 psf would be realized at a sea level flight ,speed of 300 knots.", - "page_start": 26, - "page_end": 27, - "source_file": "00-80T-80.pdf" - }, - { - "text": "PITOT WITH SEPARATE STATIC SOURCE\nPRESSURE INDICATED BY GAUGE IS DIFFERENCE BETWEEN TOTAL AND STATIC PRESSURE, H-p= q\nFigure. 1.5. Airspeed Measurement\ninstrument and errors due to position or location of the installation. The instrument error must be small by design of the equipment and is usually negligible in equjpment which is properly maintained and cared for. The position error of the installation must be small in the range of airspeeds involving critical performance conditions. Position errors are most usually confine,d to the static source in that the actual static pressure sensed at the static port may be different from the free airstream static pressure. When the .,aircraft is operated through a large range' of angles of attack, the static pressure distribution varies 'quite greatly and it becomes quite difficult to'minimize the static source error. In most instances a compensating group of static sources may be combined to reduce the position error. In order to appreciate the magnitude of this problem, at flight speed near 100 knots a\n0.05 psi position error is an airspeed error of 10 knots. A typical variation of airspeed system position error is illustrated in figure 1.6.\n(3) The equivalent airspeed (PAS) is the result of correcting the (CAS) for compressibility effects. At high flight speeds the stagnation pressure recovered in the pitot tube is not representative of the airstream dynamic pressure due to a magnification by compressibility. Compressibility of the airflow produces a stagnation pressure in the pitot which is greater than if the flow were incompressible. As a result, the airspeed indication is given an erroneous magnihcation. The standard airspeed indicator is calibrated to read correct when at standard sea level conditions and thus has a compressibility correction appropriate for these conditions. However, when the aircraft is operating above standard sea level altitude,\nRevised January 1965\n11\nNAVWEPS 00-801-80 BASIC AERODYNAMICS", - "page_start": 28, - "page_end": 29, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\nThis equation is the Bernoulli equation for 'incompressible flow. It is important to appreciate that the term >$pV2 has the units of pressure, psf. This term is one of the most important in all aerodynamics and appears so frequently t&it is given the name 'dynamic pressure' and the shorthand notation '4'.\nq= dynamic pressure, psf = jgpv2\nWith this definition it could be said that the sum of static and dynamic pressure in the flow tube remains constant.\nFigure 1.3 illustrates the variation of static, dynamic, and total pressure of air flowing through a closed tube. Note that the total pressure is con,stant throughout the length and any change in dynamic pressure produces the same magnitude change in static pressure.\nThe dynamic pressure of a free airstream is the one 'common denominator of all aerodynamic forces and moments. Dynamic pressure represents the kinetic energy of the free airstream and is a factor relating the capability for producing changes in static pressure on a surface. As defined, the dynamic, pressure varies directly as the density and the square of the velocity. Typical values of dynamic pressure, 4, are shown in table l-1 for various true airspeeds in the standard atmosphere. Notice that the dynamic pressure at some fixed velocity varies directly with the density ratio at any altitude. Also, appreciate the fact that at an altitude of 40,oM) feet (where the density ratio, b, is 0.2462) it is necessary to have a true air velocity twice that at sea level in order to product the same dynamic pressure.\n9\nNAVWEPS 00-801-80 BASIC AERODYNAMICS\nTABLE l-l. Effect of Speed and Altitvde on Dwzmnic Prerrure", - "page_start": 26, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Ambient air temperature\nThe kinematic viscosity of air at standard sea level conditions is 0.0001576 square feet per second. At an altitude of 40,000 feet the kinematic viscosity is increased to 0.0005059 square foot per second.\nIn order to provide a common denominator for comparison of various aircraft, a standard atmosphere has been adopted. The standard atmosphere actually represents the mean or average properties of the atmosphere. Figure 1.1 illustrates the variation of the most important properties of the air throughout the standard atmosphere. Notice that the lapse rate is constant in the troposphere and the stratosphere begins with the isothermal region.\nSince all aircraft performance is compared and,evaluated in the environment of the standard atmosphere, all of the aircraft instrumentation is calibrated for the standard atmosphere.\n4\nThus, certain corrections must apply to the instrumentation as well as the aircraft performance if the operating conditions do not fit the standard atmosphere. In order to properly account for the nonstandard atmosphere certain terms must be defined. Pressure .&itudc is the altitude in the standard atmosphere corresponditrg to a particular pressure. The aircraft altimeter is essentially a sensitive barometer calibrated to indicate altitude in the staotlard atmosphere. If the altimeter is set for 29.92 in. Hg the altitude indicated is the pressure altitude-the altitude in the standard atmosphere corresponding to the sensed pressure. Of course, this indicated pressure altitude may not be the actual height above sea level due to variations in remperature, lapse rate; atniospheric pressure, and possible errors in the sensed pressure.\nThe more appropriate term for correlating aerodynamic performance in the nonstandard atmosphere is density &it&-the altitude in the standard atmosphere corresponding to a particular value of air density. The computation of density altitude must certainly involve consideration of pressure (pressure altitude) and temperature. Figure 1.6 illustrates the manner in which pressure altitude and temperature combine to produce a certain density altitude. This chart is quite standard in use and is usually included in the performance section of the flight handbook. Many subject areas of aerodynamics and aircraft performance will emphasize density altitude and temperature as the most important factors requiring consideration.", - "page_start": 21, - "page_end": 21, - "source_file": "00-80T-80.pdf" - }, - { - "text": "DENSITY ALTITUDE CHART +g&\nFigure 1.6. Airspeed Corrections (sheet 2 of 2)\nNAVWEPS 00-SOT-80 BASIC AERODYNAMICS\nthe inherent compensation is inadequate and additional correction must be applied. The subtractive corrections that must be applied to CA$ depend on pressure altitude and CAS and are shown on figure 1.6 for the subsonic flight range. The equivalent airspeed (EAS) is the flight speed in the standard sea level air mass which would produce the same free stream dynamic pressure as the actual flight condition.\n(4) The true airspeed (TAS) results when the &4X is corrected for density altitude. Since the airspeed indicator is calibrated for the dynamic pressures corresponding to airspeeds at standard sea level conditions, variations in air density must be accounted for. To relate EAS and TAX requires consideration that the EAS coupled with stand.ard sea level density produces the same dynamic pressure as the TAX Soupled with the ^^_._^ 1 .:.. 2---:... ,.f *L., bl:A.* rnrJ;r;m.. dCLUd, 'all UcIIJIcy 'I L11L ''6°C C'IIUACI'L'. From this reasoning, it can be shown that:\n(TAS)2p=(EAS)2 po d -or, TAS=EAS 62 P TAS= EAS 2\n4\nwhere TAX= true airspeed EAS=equivalent airspeed p=actual air density PO= standard sea level air density n=altitude density ratio, p/pa\nThe result shows that the TAX is a function of EAS and density altitude. Figure 1.6 shows a chart of density altitude as a function of pressure altitude and temperature. Each particular density altitude fixes the proportion between TAX and EAS. The use of a navigation computer requires setting appropriate values of pressure altitude and temperature on the scales which then fixes rhe proportion between the scales of TAS and EAS (or TAS and CAS when compressibiliry corrections are applicable).\nRevlted Jmuoy 1965\n14\nThus, the airspeed indicator system measures dynamic pressure and will relate true flight velocity when instrument, position, compressibility, and density corrections are applied. These corrections are quite necessary for accurate determination of true airspeed and accurate navigation.", - "page_start": 30, - "page_end": 31, - "source_file": "00-80T-80.pdf" - }, - { - "text": "DEVELOPMENT OF AERODYNAMIC FORCES\nThe typical airflow patterns exemplify the relationship of static pressure and velocity defined by Bernoulli. Any object placed in an airstream will have the a& to impact or stagnate at some point near the leading edge. The pressure at this point of stagnation will be an absolute static pressure equal to the total pressure of the airstream. In other words, the static pressure at the stagnation point will be greater than the atmospheric pressure by the amount of the dynamic pressure of the airstream. As the flow divides and proceeds around. the object, the increases in local velocity produce decreases in static pressure. This procedure of flow is best illustrated by the flow patterns and pressure distributions of figure 1.7.\nSTREAMLINE PATTERN AND PRESSURE DISTRIBUTION. The flow pattern of the cylinder of figure 1.7 is characterized by the streamlines which denote the local flow direction. Velocity distribution is noted by the streamline pattern since the streamlines effect a boundary of flow, and the airflow between the streamlines is similar to flow in a closed tube. When the streamlines contract and are close together, high local velocities exist; when the streamlines expand and are far apart, low local velocities exist. At the", - "page_start": 31, - "page_end": 31, - "source_file": "00-80T-80.pdf" - }, - { - "text": "DENSITY ALTITUDE CHART +g&\nBernoulli's principle and the concepts of static, dynamic, and total pressure are the basis of aerodynamic fundamentals. The pressure distribution caused by the variation of local stack and dynamic pressures on a surface is the source of the major aerodynamic forces and moment.", - "page_start": 31, - "page_end": 31, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\n(2) The total energy of the air stream in the tube is unchanged. However, the airstream energy may be in two forms. The airstream may have a potential energy which is related by the static pressure and a kimtic energy by virtue of mass and motion. As the total energy is unchanged, an increase in velocity (kinetic energy) will be accompanied by a decrease in static pressure (potential energy). This situation is analagous to a ball rolling along-a smooth surface. As the ball rolls downhill, the potential energy due to position is exchanged for kinetic energy of motion. If .frictionwere negligibie, the change of potential energy would equal the change in ki,netic energy. This- is also the case for the airflow within the tube.\nThe relationship of static pressure and velocity is maintained throughout the length of the tube. As the flow moves past the constriction toward station 3, the velocity decreases and the static pressure increases.\nThe Bernoulli equation for incompressible flow is most readily explained ,by accounting for the energy of the~airflow within the tube. As the airstream has no energy added or subtracted at any point, the sum of the potential +id kinetic energy must be constant. The kinetic energy of an object is found by:\n'KE. =%MV=\nwhere K;E. = kinetic energy, ft.-lbs.\nM = mass, slugs\nV'=velocity, ft./set.\nThe kinetic energy of a cubic foot of air is:\nK&x,,\nwhere g= kinetic energy per cu. ft., psf p=air density, slugs per cu. ft. V=ait velocity, ft./set.\nNAWEPS DD-BDT-BD BASIC AERODYNAMICS\nNAVWEPS 00-ROT-80 BASIC AERODYNAMICS\nFigure 1.3. Variation o\\ Pressure in Tube\nIf the potential energy is represented by the static pressure, p, the sum of the potential and kinetic energy is the total pressure of the airstream.\nH=p+% P V' where H=total pressure, psf (sometimes referred to as 'head ' pressure) p=static pressure, psf. p=density, siugs per cu. ft. V= velocity, ft./set.", - "page_start": 23, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 PREFACE\nTABLE OF CONTENTS\nCHAPTER I: BASIC AERODYNAMICS, iii = . WING AND AIRFOIL FORCES, iii = . PROPERTIES OF THE ATMOSPHERE. Static pressure Temperature Density Viscosity Standard atmosphere Pressure altitude Density altitude, iii = 1. BERNOULLI'S PRINCIPLE AND SUBSONIC AIRFLOW.., iii = 4. Bernoulli's equation,, iii = 6. Incompressible tlow Variation of static pressure and velocity Kinetic and porcntial energy of flow Static and dynamic prcssurc, 4, iii = . Airspeed measurement.. . . Stagnation prcssurc Measurement of dynamic pressure Pitot and static sources Indicated airspeed, iii = 9. DEVELOPMENT OF AERODYNAMIC FORCES.. ......., iii = 14. Streamline pattern and pressure distribution. Generatioaoflift.......................................... ....... ......., iii = 14. Circulation Pressure distribution, iii = 16. Airfoil terminology. Aerodynamic force coefficient . . Basic lift equation, iii = ',: 2 3", - "page_start": 6, - "page_end": 6, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What is the phenomenon associated with the production of lift by an airfoil ?", - "target_page": 34, - "target_passage": "An important phenomenon associated with the production of lift by an airfoil is the “circulation” parted to the airstream. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "NAVWEPS 00-801-80 BASIC AERODYNAMICS\nrotation will be quite a 'curve ball artist' the golfer that cannot control the lateral motion of the club face striking the golf ball will impart an uncontrollable spin and have trouble with a 'hook' or 'slice.'\nWhile a rotating cylinder can produce a net lift from the circulatory flow, the method is relatively inefficient and only serves to point out the relationship between lift and circula-, tion. An airfoil is capable of producing lift with relatively high efficiency and the process is illustrated in figure 1.8. If a symmetrical airfoil is placed at zero angle of attack to the airstream, the streamline pattern and pressure distribution give evidence of zero lift. HOWever, if the airfoil is given a positive angle of attack, changes occur in the streamline pattern and pressure distribution similar to changes caused by the addition of circulation to the cylinder. The positive angle of attack causes increased velocity on the upper surface with an increase in upper surface suction while the decreased velocity on the lower surface causes a decrease in lower surface suction. Also, upwash is generated ahead of the airfoil, the forward stagnation point moves under the leading edge, and a downwash is evident aft of the airfoil. The pressure distribution 0' the airfoil now provides a net force perpendicular to the airstream-lift.\nThe generation of lift by an airfoil is dependent upon the airfoil being able to create circulation in the airstream and develop the lifting, pressure distribution on the surface. In all cases, the generated lift will be the net force caused by the distribution of pressure over the upper and lower surfaces of the airfoil. At low angles of attack, suction pressures usually will exist on both upper and lower surfaces. but the upper surface suction must be greater for positive lift. At high angles of attack near that for maximum lift, a positive pressure will exist on the lower surface but this will account for approximately one-third the net lift.", - "page_start": 37, - "page_end": 37, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801~0 BASIC AERODYNAMICS\nnet lift produced by the airfoil is difference between the lifts on the upper and lower surfaces. The point along the chord where the distributed lift is effectively concentrated is termed the 'center of pressure, c.p.' The center of pressure is essentially the 'center of gravity' of the distributed lift pressure and the location of the c.p. is a function of camber and section lift coe&cient\nAnother aerodynamic reference point is the 'aerodynamic center, d.e.' The aerodynamic center is defmed as the point along the chord where all changes in lift effectively take place. To visualize the existence of such a point, notice the change in pressure distribution with angle of attack for the symmetrical airfoil of figure 1.21. When at zero lift, the upper and lower surface lifts are equal and located at the same point. With an increase in angle of attack, the upper surface lift increases while the lower surface lift decreases. The change ,of lift has taken place with no change in the center of pressure-a characteristic of symmetrical airfoils.\nNext, consider the cambered airfoil of figure 1.21 at zero lift. To produce zero lift, the upper and lower surface lifts must be equal. One difference noted from the symmetrical airfoil is that the upper and lower surface lifts are not opposite one another. While no net lift exists on the airfoil, the couple produced by the upper and lower surface lifts creates a nose down moment. As the angle of attack is increased, the upper surface lift increases while the lower surface lift decreases. While a change in lift has taken place, no change in moment takes place about the point where the lift change occurs. Since the moment about the aerodynamic center is the product of a force (lift at the c.P.) and a lever arm (distance from c.9. to a.~.), an increase in lift moves the center of pressure toward the aerodynamic center.\nIt should be noted that the symmetrical airfoil at zero lift has no pitching moment about the aerodynamic center because the upper and\nNAVWEPS DD-BOT-80 BASIC AERODYNAMICS\nCAMBERED AIRFOIL\nFigure 1.27. Development of Pitching Moments\n48\nlower surface lifts act along the same vertical line. An increase in.lift on the symmetrical airfoil produces no change in this situation and the center of pressure remains fixed at the aerodynamic center.", - "page_start": 64, - "page_end": 66, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00.401-80 BASIC AERODYNAMICS\nAIRFOIL LIFT CHARACTERISTICS. Airfoil section properties differ from wing or airplane properties because of the effect of the planform. Actually, the wing may have vatious airfoil sections from root to tip with taper, twist, sweepback and local flow components in a spanwise direction. The resulting aetodynamic properties of the wing are determined by the action of each section along the span and the three-dimensional flow. Airfoil section properties are derived from the basic shape or profile in two-dimensional flow and the force coefficients are given a notation of lower case letters. For example, a wing or airplane lift coefficient is C, while an airfoil section lift coefficient is termed cr. Also, wing angle of attack is Q while section angle of attack is differentiated by the use of 01~. The study of section properties allows an objective consideration of the effects of camber, thickness, etc.\nThe lift characteristics of five illustrative airfoil sections are shown in figure 1.12. The section lift coe&icient, c,, is plotted versus section angle of attack, olO, for five standard NACA airfoil profiles. One characteristic feature of all airfoil sections is that the slope of the various lift curves is essentially the same. At low lift coefhcients, the section lift coefficient increases approximately 0.1 for each degree increase in angle of attack. For each of the airfoils shown, a S' change in angle of\nNAVWEPS OD-8OT-80 BASIC AERODYNAMICS", - "page_start": 44, - "page_end": 45, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS OO-EOT-RO BASIC AERODYNAMICS\n40 percent chord. When this section is compared with the NACA 0006 section the effect of camber can be appreciated. At low lift coefficients the thtn, symmetrical section has much lower drag. However, at lift coefficients above 03 the thicker, cambered section has the lower drag. Thus, proper camber and thickness can improve the lift-drag ratio of the section.\nThe NACA 63,412 is a cambered 12 percent thick airfoil of the ''laminar flow' type. This airfoil is shaped to produce a design lift coe5cient of 0.4. Notice that the drag curve of this airfoil has distinct aberrations with very low drag coefficients near the lift coefficient of 0.4. This airfoil profile has its camber and thickness distributed to produce very low uniform velocity on the forward surface (minimum pressure point well aft) at this lift coefficient. The resulting pressure and velocity distribution enhance extensive laminar flow in the boundary layer and greatly reduce the skin friction drag. The benefit of the laminar flow is appreciated by comparing the minimum drag of this airfoil with an airfoil which has one-half the maximum thickness-the NACA ooo6.\nThe choice of an airfoil section will depend on the consideration oftmany different factors. While the cI, of the section is an important quality, a more appropriate factor for consideration is the maximum lift coefficient of the section when various high lift devices are applied. Trailing edge flaps and leading edge high lift devices are applied to increase the cr,, for low speed performance. Thus, an appropriate factor for comparison is the ratio of section drag coe5cient to section maximum lift coefficient with flaps-cd/crm,. When this quantity is corrected for compressibility, a preliminary selection of an airfoil section is possible. The airfoil having the lowest value of c&~, at the design flight condition (endurance, range, high speed, etc.) will create the least section drag for a given .design stall speed.\nNAVWEPS DD-BOT-BD BASK AERODYNAMICS", - "page_start": 50, - "page_end": 51, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 BASIC AERODYNAMICS\nThe effect of free stream density and velocity is a necessary consideration when studying the development of the various aerodynamic forces. Suppose that a particular shape of airfoil is fixed at a particular angle to the airstream. The relative velocity and pressure distribution will be determined by the shape of the airfoil and the angle to the airstream. The effect of varying the airfoil size, air density and airspeed is shown in figure 1.9. If the same airfoil shape is placed at the same angle to an airstream with twice as great a dynamic pressure the magnitude of the pressure distribution will be twice as great but the r&rive shape of the pressure distribution will be the same. With twice as great a pressure existing over the surface, all aerodynamic forces and moments will ~double. If a half-size airfoil ib placed at the same angle to the original airstream, the magnitude of the pressure distribution is the same as the origina! airfoi! and again the relative shape of the pressure distribution is identical. The same pressure acting on the half-size surface would reduce all aerodynamic forces to one-half that of the original. This similarity of flow patterns means that the stagnation point occurs at the same place, the peak suction pressure occurs at the same place, and the actual magnitude of the aerodynamic forces and moments depends upon the airstream dynamic pressure and the surface area. This concept is extremely important when attempting to separate and analyze the most important factors affecting the development of aerodynamic forces.\nAIRFOIL TERMINOLOGY. Since the shape of an airfoil and the inclination to the airstream are so important in determining the pressure distribution, it is necessary to properly define the airfoil terminology. Figure 1.10 shows a typical airfoil and illustrates the various items of airfoil terminology\n(1) The chord line is a straight line connecting the leading and trailing edges of the airfoil.\n20", - "page_start": 37, - "page_end": 37, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS OO-BOT-BO BASIC AERODYNAMICS\nthe lift characteristics is shown in figure 1.18. .UO~J ana' &Z~J can produce significant increases in cl, but the increased angle of attack for maximum lift can be a disadvantage. If slots were the only high lift device on the wing, the high take off and landing angles of attack may complicate the design of the landing gear. For this reason slots or slats are usually used in conjunction with flaps since the flaps provide reduction in the maximum lift angle of attack. The use of a slot has two important advantages: there is only a negligible change in the pitching moment due to the slot and no significant change in section drag at low angles of attack. In fact, the slotted section will have less drag than the basic section near the maximum lift angle for the basic section.\nThe slot-slat device finds great application in modern airplane configurations. The tailless airplane configuration can utilize only the high lift devices which have negligible effect on the pitching moments. The slot and slat are often used to increase the clin high speed flight when compressibility effects are considerable. The small change in twisting moment is a favorable feature for any high lift device to be used at high speed. Leading edge high lift devices are more effective on the highiy swept wing than trailing edge flaps since slats are quite powerful in controlling the flow pattern. Small amounts of local camber added to the leading edge as a high lift device is most effective on wings of very low thickness and sharp leading edges. Most usually the slope of the leading edge high lift device is used to control the spanwise lift distribution on the wing.\n'Boundary larcr control devices are additional means of increasing the maximum lift coe&cient of a section. The thin layer of airflow adjacent to the surface of an airfoil shows reduced local velocities from the effect of skin friction. When at high angles of attack this boundary layer on the upper surface tends to", - "page_start": 60, - "page_end": 60, - "source_file": "00-80T-80.pdf" - }, - { - "text": "HIGH LIFT DEVICES\nThere are many different types of high lift devices used to increase the maximum lift coefficient for low speed flight. The high lift devices applied to the trailing edge of a section consist of a flap which is usually 15 to 25 percent of the chord. The deflection of a flap produces the effect of a large amount of camber added well aft on the chord. The principal types of flaps are shown applied to a basic section of airfoil. The effect of a 30' deflection of a 25 percent chord flap is shown on the lift and drag curves of figure 1.17.\nNAVWEPS 00-BOT-80 BASIC AERODYNAMICS\nBASIC SECTION\nFigure 1.17. Flap Configurations\n40\nRevised January 1965\nThe plainjap shown in figure 1.17 is a simple hinged portion of the trailing edge. The effect of the camber added well aft on the chord causes a significant increase in cbr. In addition, the zero lift angle changes to a more negative value and the drag increases greatly. The split flap shown in figure 1.17 consist of plate deflected from the lower surface of the section and produces a slightly greater change in c ImoT than the plain flap. However, a much larger change in drag results from the great turbulent wake produced by this type flap. The greater drag'may not be such a disadvanrage when ir is realized that it may be advantageous to accomplish steeper landing approaches over obstacles or require higher power from the engine during approach (to minimize engine acceleration time for waveoR).\nThe slottedPap is similar to the plain flap but the gap between the main section and flap leading edge is given specific contours. High energy air from the lower surface is ducted to the flap upper surface. The high energy air from the slot accelerates the upper surface boundary layer and delays airflow separation to some higher lift coefficient. The slotted flap can cause much greater increases in c,,, than the plain or split flap and section drags are much lower.\nThe Fowkr&zp arrangement is similar to the slotted flap. The difference is that the deflected flap segment is moved aft along a set of tracks which increases the chord and effects an increase in wing area. The Fowler flap is characterized by large increases in c,,, with minimum changes in drag. ,.", - "page_start": 56, - "page_end": 58, - "source_file": "00-80T-80.pdf" - }, - { - "text": "DEVELOPMENT OF AERODYNAMIC PITCHING MOMENTS\nThe distribution of pressure over a surface is the ,source of the aerodynamic moments as well as the aerodynamic forces. A typical example of this fact is the pressure distribution acting on the cambered airfoil of figure 1.21. The upper surface has pressures distributed which produce the upper surface lift; the lower surface has pressures distributed which produce the lower surface lift. Of course, the\n47", - "page_start": 64, - "page_end": 64, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00.401-80 BASIC AERODYNAMICS\nThus, a sea level airspeed (or EAS) of 100 knots would provide the dynamic pressure necessary at maximum lift to produce 14,250 Ibs. of lift. If the airplane were operated at a higher weight, a higher dynamic pressure would be required to furnish the greater lift and a higher stall speed would result. If the airplane were placed in a steep turn, the greater lift required in the turn would increase the stall speed. If the airplane were flown at a higher density altitude the TAX at stall would increase. However, one factor common to each of these conditions is that the angle of attack at C,,,, is the same. It is important to realize that stall warning devices must sense angle of attack (a) or pressure distribution (related to CL).\nAnother important fact related by the basic lift equation and lift curve is variation of angle of attack and lift coefficient with airspeed. Suppose that the example airplane is flown in steady, wing 1eveJ flight at various airspeeds with lift equal to the weight. It is obvious that an increase in airspeed above the stall speed will require a corresponding decrease in lift coeflicient and angle of attack to maintain steady, lift-equal-weight flight. The exact relationship of lift coefficient and airspeed is evolved from the basic lift equation assuming constant lift (equal to weight) and equivaIent airspeeds.\nC' v, p -= -C %n.* 0 V\nThe example airplane was specified to have:\nWeight = 14,250 lbs. C L,,,=lS V,= 100 knots EAS\nThe following table depicts the lift coefficients and angles of attack at various airspeeds in steady flight.\nNAWWEPS 00-8OT-80 BASIC AERODYNAMICS\n26\nloo. ................., 1 = l.lm. loo. ................., 2 = 1.30. loo.", - "page_start": 42, - "page_end": 44, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 HIGH SPEED AERODYNAMICS\n(4) Sweepback contributes to lateral stability in rhe same sense as dihedral. When the swept wing aircraft is placed in a sideslip, the wing into the wind experiences an increase in lift since the sweep is less and the wing away from the wind produces less lift since rhe sweep is greater. As shown in figure 3.15, the swept wing aircraft in a sideslip experiences lift changes and a subsequent rolling moment which tends to right the aircraft. This lateral stability conrribution depends on the sweepback and the lift coefficient of the wing. A highly swept wing operating at high lift coeflicient usually experiences such an excess of this lateral stability contribution that adequate controllability may be a significant problem. As shown, the swept wing has certain important advantages. However, the use of sweepback produces certain inevitable disadvantages which are important from the standpoint of both airplane design and flight operations. The most important of these disadvantages are as follows:\n(1) When sweepback is combined with taper there is an extremely powerful tendency for the wing to stall tip first. This pattern of stall is very undesirable since there would be little stall warning, a serious reduction in lateral control effectiveness, and the forward shift of the center of pressure would contribute to a nose up moment ('pitch up' or 'stick force lightening'). Taper has its own effect of producing higher local lift coefhcients toward the tip and one of the effects of sweepback is very similar. All outboard wing sections are affected by the upwash of the preceding inboard sections and the lift distribution resulting from sweepback alone is similar to that of high taper.\nAn additional effect is the tendency to develop a strong spanwise flow of the boundary layer toward the tip when the wing is at high lift coefficients. This spanwise flow produces a relatively low energy boundary layer near the tip which can be easily sep-\n251", - "page_start": 248, - "page_end": 248, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What are the recyclable waste ?", - "target_page": 3, - "target_passage": "All types of paper and cardboard, Metal packaging, even the smallest ones, Plastic bottles and flasks, All other packaging", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Operations\nTransfer and Disposal Services. We own or operate 96 transfer stations. We deposit waste at these stations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport to disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had approximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of approximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based on engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully. Some of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated soils. See \"\"Ì Properties.''\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently permitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and evaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices, market needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand, we are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be made that all future expansions will be permitted as designed.\nOther Services. We have 35 materials recovery facilities and other recycling operations, which are generally required to fulÑll our obligations under long-term municipal contracts for residential collection services. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable materials are internally collected by our residential collection operations. In some areas, we receive commercial and industrial solid waste that is sorted at our facilities into recyclable materials and nonrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the nonrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our exposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby minimizing our recycling investment.\nWe provide remediation and other heavy construction services primarily through our subsidiary located in Missouri.\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is processed, packaged and sold as various products.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Other Fuels\nMunicipal solid waste\nIndustrial waste\nFuel mixtures (fossil and biomass)\nWaste gas\nOther wastes\nHydrogen", - "page_start": 46, - "page_end": 46, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Overview of Our Business\nWe are a leading provider of non-hazardous solid waste collection and disposal services in the United States. We provide solid waste collection services for commercial, industrial, municipal and residential customers through 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid waste landÑlls and 35 recycling facilities.\nWe generate revenue primarily from our solid waste collection operations. Our remaining revenue is from other services including landÑll disposal, recycling, compost, mulch and soil operations.\nThe following table reÖects our revenue by source for the years ended December 31, 2004, 2003 and 2002 (in millions):", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Regulation\nState Regulation. Each state in which we operate has its own laws and regulations governing solid waste disposal, water and air pollution, and, in most cases, releases and cleanup of hazardous substances and liability for such matters. States also have adopted regulations governing the design, operation, maintenance and closure of landÑlls and transfer stations. Our facilities and operations are likely to be subject to these types of requirements. In addition, our solid waste collection and landÑll operations may be aÅected by the trend in many states toward requiring the development of solid waste reduction and recycling programs. For example, several states have enacted laws that require counties or municipalities to adopt comprehensive plans to reduce, through solid waste planning, composting, recycling or other programs, the volume of solid waste deposited in landÑlls. Additionally, laws and regulations restricting the disposal of certain waste in solid waste landÑlls, including yard waste, newspapers, beverage containers, unshredded tires, lead-acid batteries and household appliances, have been promulgated in several states and are being considered in others. Legislative and regulatory measures to mandate or encourage waste reduction at the source and waste recycling also are or have been under consideration by the U.S. Congress and the U.S. EPA, respectively.\nIn order to construct, expand and operate a landÑll, one or more construction or operating permits, as well as zoning and land use approvals, must be obtained. These are diÇcult and time-consuming to obtain, are often opposed by neighboring landowners and citizens' groups, may be subject to periodic renewal and are subject to modiÑcation and revocation by the issuing agency. In connection with our acquisition of existing landÑlls, it may be and on occasion has been necessary for our company to expend considerable time, eÅort and money to bring the acquired facilities into compliance with applicable requirements and to obtain the permits and approvals necessary to increase their capacity.", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "When to put my garbage container outside?\nThe evening before the waste collection day.", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "WASTE MANAGEMENT\nSantos trialled innovative waste management techniques during 2004 to reduce the volume of hydrocarbon waste generated from Cooper Basin operations. Preliminary results indicate that these waste volumes can be reduced to 3-5% of their original volume, which is a significant achievement.\nThis technology will be implemented where possible", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Operations\nOur operations primarily consist of the collection, transfer and disposal of non-hazardous solid waste.\nCollection Services. We provide solid waste collection services to commercial, industrial, municipal and residential customers in 22 states through 140 collection companies. In 2004, 74.3% of our revenue was derived from collection services consisting of approximately 32.5% from services provided to municipal and residential customers, 36.6% from services provided to commercial customers, and 30.9% from services provided to industrial and other customers.\nOur residential collection operations involve the curbside collection of refuse from small containers into collection vehicles for transport to transfer stations or directly to landÑlls. Residential solid waste collection services are typically performed under contracts with municipalities, which we generally secure by competitive bid and which give our company exclusive rights to service all or a portion of the homes in their respective jurisdictions. These contracts or franchises usually range in duration from one to Ñve years, although some of our exclusive franchises are for signiÑcantly longer periods. Residential solid waste collection services may also be performed on a subscription basis, in which individual households contract directly with our company. The fees received for subscription residential collection are based primarily on market factors, frequency and type of service, the distance to the disposal facility and cost of disposal. In general, subscription residential collection fees are paid quarterly in advance by the residential customers receiving the service.\nIn our commercial and industrial collection operations, we supply our customers with waste containers of varying sizes. We also rent compactors to large waste generators. Commercial collection services are generally performed under one- to three-year service agreements, and fees are determined by such considerations as:\n, market factors,\n, collection frequency,\n, type of equipment furnished,\n, the type and volume or weight of the waste collected,\n, the distance to the disposal facility and\n, the cost of disposal.\nWe rent waste containers to construction sites and also provide waste collection services to industrial and construction facilities on a contractual basis with terms generally ranging from a single pickup to one year or longer. We collect the containers or compacted waste and transport the waste either to a landÑll or a transfer station for disposal.\nAlso, we currently provide recycling services in certain markets primarily to comply with local laws or obligations under our franchise agreements. These services include the curbside collection of residential recyclable waste and the provision of a variety of recycling services to commercial and industrial customers.\n7", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "What materials ('feedstocks') are used to make compost?\nCompost facilities in Washington recycle a variety of organic materials, including yard debris, food scraps, manure, biosolids, forest residuals like sawdust and bark, construction wood, and agricultural residues. All of these materials can be used to produce high quality compost. Your supplier can tell you which materials they compost.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Regulation\nOur facilities and operations are subject to a variety of federal, state and local requirements that regulate the environment, public health, safety, zoning and land use. Operating and other permits, licenses and other approvals are generally required for landÑlls and transfer stations, certain solid waste collection vehicles, fuel storage tanks and other facilities that we own or operate, and these permits are subject to revocation, modiÑcation and renewal in certain circumstances. Federal, state and local laws and regulations vary, but generally govern wastewater or stormwater discharges, air emissions, the handling, transportation, treatment, storage and disposal of hazardous and non-hazardous waste, and the remediation of contamination associated with the release or threatened release of hazardous substances. These laws and regulations provide governmental authorities with strict powers of enforcement, which include the ability to obtain injunctions and/or impose Ñnes or penalties in the case of violations, including criminal penalties. The U.S. Environmental Protection Agency and various other federal, state and local environmental, public and occupational health and safety agencies and authorities administer these regulations, including the Occupational Safety and Health Administration of the U.S. Department of Labor.\nWe strive to conduct our operations in compliance with applicable laws and regulations. However, in the existing climate of heightened environmental concerns, from time to time, we have been issued citations or notices from governmental authorities that have resulted in the need to expend funds for remedial work and related activities at various landÑlls and other facilities. There is no assurance that citations and notices will not be issued in the future despite our regulatory compliance eÅorts. We have established remediation reserves that we believe, based on currently available information, will be adequate to cover our current estimates of regulatory costs. However, we cannot assure you that actual costs will not exceed our reserves.\nFederal Regulation. The following summarizes the primary environmental, public and occupational health and safety-related statutes of the United States that aÅect our facilities and operations:\n(1) The Solid Waste Disposal Act, as amended, including the Resource Conservation and Recovery Act. RCRA and its implementing regulations establish a framework for regulating the handling,\n9\ntransportation, treatment, storage and disposal of hazardous and non-hazardous solid waste, and require states to develop programs to ensure the safe disposal of solid waste in sanitary landÑlls.", - "page_start": 16, - "page_end": 17, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Compost Beginnings\nThe yard debris or food scraps* that you place into your home compost bin, take to a drop-off site, or set out for curbside collection could become the compost that you later use on your garden, lawn, and flowerbeds.\nIt is essential to place only quality organic material into the composting process. Here are some tips:\nl The products you use or spray in your yard can end up in the compost process. Carefully read the labels of pesticide and herbicide products you use. (See page 9.)\nl Please keep yard debris free of :\nx Garbage\nx Plastic of any sort\n- Plastic plant pots\n- Plastic plant tabs\n- Plastic bags (if you want to bag your yard debris, use paper garden bags - available at most garden centers)\nx Rock, brick, or masonry\nx Glass or metal\nx Pet waste.\n* Many localities now collect food scraps and food-soiled paper along with yard debris for composting. Call your local collection service to find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What is the day of the black container in Lachapelle ?", - "target_page": 4, - "target_passage": "LACHAPELLE MONDAY green weeks", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Out container = full container\nPut your rubbish container out only when full.\nAttention ! Black garbage bags left on the ground will no longer be collected.\nPlease be respectful with the agents.", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "HOW TO GET A COMPOST KIT?\nTUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = AGNAC. MONDAY green weeks, Black container = WEDNESDAY white weeks. MONDAY green weeks, Yellow container = ALLEMANS-DU-DROPT. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = ARMILLAC. WEDNESDAY green weeks, Black container = FRIDAY white weeks. WEDNESDAY green weeks, Yellow container = BOURGOUGNAGUE. MONDAY green weeks, Black container = WEDNESDAY white weeks. MONDAY green weeks, Yellow container = CAMBES. MONDAY green weeks, Black container = THURSDAY white weeks. MONDAY green weeks, Yellow container = LACHAPELLE. TUESDAY white weeks, Black container = WEDNESDAY green weeks. TUESDAY white weeks, Yellow container = LAPERCHE. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = LA-SAUVETAT-DU-DROPT. MONDAY green weeks, Black container = FRIDAY white weeks. MONDAY green weeks, Yellow container = LAUZUN. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = LAVERGNE. TUESDAY green weeks, Black container = THURSDAY white weeks. TUESDAY green weeks, Yellow container = MIRAMONT-DE-GUYENNE. WEDNESDAY white weeks, Black container = WEDNESDAY green weeks. WEDNESDAY white weeks, Yellow container = MONTIGNAC-DE-LAUZUN. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = MONTIGNAC-TOUPINERIE. WEDNESDAY green weeks, Black container = WEDNESDAY white weeks. WEDNESDAY green weeks, Yellow container = MOUSTIER. MONDAY green weeks, Black container = THURSDAY white weeks. MONDAY green weeks, Yellow container = PEYRIÈRE. MONDAY green weeks, Black container = WEDNESDAY white weeks. MONDAY green weeks, Yellow container = PUYSSERAMPION. MONDAY white weeks, Black container = THURSDAY green weeks. MONDAY white weeks, Yellow container = ROUMAGNE. WEDNESDAY white weeks, Black container = WEDNESDAY green weeks. WEDNESDAY white weeks, Yellow container = SAINT-COLOMB-DE-LAUZUN. MONDAY white weeks, Black container = FRIDAY green weeks. MONDAY white weeks, Yellow container = SAINT-PARDOUX-ISAAC. WEDNESDAY white weeks, Black container = WEDNESDAY green weeks. WEDNESDAY white weeks, Yellow container = SEGALAS", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers\nTable 8 and Table 9 show the results for the white-box and black-box settings, respectively. (Here, percentage numbers are not averaged and there is no standard error since we used a single gadget per query.) The white-box results are nearly perfect; the black-box results are often better but sometimes somewhat worse than those for query-independent gadgets. We conjecture that this is due to some level of overfitting.", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv1.pdf" - }, - { - "text": "Dockerfile\nA text file that contains instructions to build a Docker image.", - "page_start": 262, - "page_end": 262, - "source_file": "sg248459.pdf" - }, - { - "text": "Ephemeral storage\nContainer images are stored locally on the nodes running Red Hat OpenShift Container Platform pods.\nWhen Docker run time is used, the /var/lib/docker mount point is used by active containers and pods. This local storage is where the node maintains a copy of container images that are pulled from a container registry. This mount point is managed by docker-storage and it uses the following naming format: /var/lib/docker/overlay2/ and /var/lib/docker/containers/ .", - "page_start": 111, - "page_end": 111, - "source_file": "sg248459.pdf" - }, - { - "text": "6.3 OpenShift container platform deployment\nThis section provides an OpenShift container deployment platform.", - "page_start": 126, - "page_end": 126, - "source_file": "sg248459.pdf" - }, - { - "text": "Container\nA container is a software object that holds or organizes other software objects or entities.", - "page_start": 794, - "page_end": 794, - "source_file": "sg247938.pdf" - }, - { - "text": "Liquid\nBio-alcohol Sulphur lies (Black liquor) Sewage sludge Other liquid biomass", - "page_start": 46, - "page_end": 46, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "CRI-O\nAn integration point between Kubernetes and container runtimes that makes pods (groups of containers) work in Kubernetes clusters.", - "page_start": 262, - "page_end": 262, - "source_file": "sg248459.pdf" - }, - { - "text": "3.6.4. Lack of education to data\nAs far as we're concerned, the real issue here is not who was right and why, exactly, all the others made certain mistakes. The actual problem is: how many of the people who saw Gelmini unprepared on TV the day this case started also followed up the story in the next days and found out that things weren't exactly as they had looked in that talk show, even if Letta had \"proved\" his case with actual, exact \"data\"? How many citizens are educated to follow the analysis of some data over time ?", - "page_start": 20, - "page_end": 20, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What to do if my container is stolen ?", - "target_page": 4, - "target_passage": "Container stolen: What to do? In case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Container stolen: What to do?\nIn case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "When to put my garbage container outside?\nThe evening before the waste collection day.", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "Out container = full container\nPut your rubbish container out only when full.\nAttention ! Black garbage bags left on the ground will no longer be collected.\nPlease be respectful with the agents.", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "Ephemeral storage\nContainer images are stored locally on the nodes running Red Hat OpenShift Container Platform pods.\nWhen Docker run time is used, the /var/lib/docker mount point is used by active containers and pods. This local storage is where the node maintains a copy of container images that are pulled from a container registry. This mount point is managed by docker-storage and it uses the following naming format: /var/lib/docker/overlay2/ and /var/lib/docker/containers/ .", - "page_start": 111, - "page_end": 111, - "source_file": "sg248459.pdf" - }, - { - "text": "Container\nA container is a software object that holds or organizes other software objects or entities.", - "page_start": 794, - "page_end": 794, - "source_file": "sg247938.pdf" - }, - { - "text": "4.4.2 Third-party registries\nOpenShift Container Platform can create containers by using images from third-party registries. However, these registries do not offer the same image notification support as the integrated OpenShift Container Platform registry. In this situation, OpenShift Container Platform fetches tags from the remote registry upon imagestream creation. Refreshing the fetched tags is as simple as running the oc import-image command. When new images are detected, the build that was described in 4.4.1, 'Integrated OpenShift Container Registry' and deployment reactions occur.", - "page_start": 84, - "page_end": 84, - "source_file": "sg248459.pdf" - }, - { - "text": "Container Orchestration\nManages the deployment, placement, and lifecycle of containers. See Kubernetes.", - "page_start": 262, - "page_end": 262, - "source_file": "sg248459.pdf" - }, - { - "text": "Related resource:\n· Deploy container images", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" - }, - { - "text": "* Pods [pod]:\nA set of one or more containers that are deployed onto a Node together and share a unique IP and Volumes (persistent storage). Pods also define the security and runtime policy for each container.", - "page_start": 163, - "page_end": 163, - "source_file": "sg248459.pdf" - }, - { - "text": "6.3 OpenShift container platform deployment\nThis section provides an OpenShift container deployment platform.", - "page_start": 126, - "page_end": 126, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "How many people include the Dyspnea study ?", - "target_page": 1, - "target_passage": "This population-based study included 2,857 adults who were experiencing respiratory symptoms.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Take-home Points\nStudy Question: How profoundly are adults with undiagnosed respiratory symptoms affected by dyspnea?\nResults: In community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with preserved ratio impaired spirometry experienced the greatest impact of dyspnea, followed by those with undiagnosed asthma or COPD. Greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nInterpretation: Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity.\nDyspnea refers to a subjective sensation of breathing discomfort. 1 In a study involving a community-based population aged > 70 years, the prevalence of dyspnea was found to be 32%. 2 Dyspnea can lead to limitations in daily activities, reduced exercise tolerance, and heightened mortality risks. 3\nDyspnea not only affects individuals with diagnosed respiratory conditions but also poses a signi /uniFB01 cant burden on those with undiagnosed conditions. In a systematic review by Müller et al, 4 the combined", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nOur study explored dyspnea in community-based adults with undiagnosed respiratory symptoms identi /uniFB01 ed via case /uniFB01 nding. Surprisingly, we found that the dyspnea experienced by those with PRISm had a greater impact on their activities and health status than those with newly diagnosed COPD or asthma.\nThe prevalence of individuals who were obese and morbidly obese in the PRISm group partially explains the between-group difference in dyspnea. The excess dyspnea seen in the PRISm group when compared with the normal spirometry group is partly explained by patient-speci /uniFB01 c risk factors, including BMI, which shrink the mean dyspnea differential between the groups from 11.2 to 5.5 points (Tables 3-6). The remaining 5.5point difference indicates that PRISm patients have excess dyspnea relative to symptomatic individuals with normal spirometry for additional reasons other than obesity.\n[\n166#6 CHEST DECEMBER 2024\n]\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nDyspnea is a complex, subjective symptom that is modi /uniFB01 ed by nonrespiratory factors including psychosocial, social, and environmental in /uniFB02 uences. 5 Interindividual variability in the perception of dyspnea, in /uniFB02 uenced by these nonrespiratory factors, may play an important role. A study conducted by Ziegler et al 24 assessed the perception of dyspnea in 42 healthy individuals using a standardized inspiratory resistive loading stimulus. The study used the modi /uniFB01 ed Borg scale to measure dyspnea perception levels. Among the participants subjected to the same inspiratory resistive load, 31%, 45%, and 24% of participants classi /uniFB01 ed their level of dyspnea as low, intermediate, and high, respectively. The study revealed that differences between individuals contribute considerable variability to the perception of dyspnea, even among healthy participants.\nThe affective dimension of dyspnea can be captured using additional questionnaires (eg, Multidimensional Dyspnea Pro /uniFB01 le, Dyspnea-12). Studies have explored the use of the Multidimensional Dyspnea Pro /uniFB01 le in\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Assessment of the Impact of Participants ' Dyspnea\nAlthough neither the CAT nor the SGRQ are dyspneaspeci /uniFB01 c tools, both are recommended by the Global Initiative for Chronic Obstructive Lung Disease to evaluate symptoms, including dyspnea, 20 and both yield a richer assessment of dyspnea than the modi /uniFB01 ed Medical Research Council breathlessness scale. 20 Fifteen questions were taken from the CAT and SGRQ questionnaires that referred to individuals ' experiences with dyspnea, and a composite measure of dyspnea impact using a weighted sum of the responses to the 15 questions was constructed. Questions were coded so that larger values indicate more impactful dyspnea. Weights used for question responses in calculating the dyspnea impact assessment measure were those of the /uniFB01 rst component of a principal component analysis (PCA) based on the covariance matrix of question responses. Questions with multiple responses and ordinal structure are individually more informative and thus were accorded higher weight than individual true-false questions. No additional PCA component was anticipated a priori to be material for our investigation, and an eigenvalue analysis of the PCA was conducted to verify this assumption.\nThe composite dyspnea impact measure was scaled so its minimum value was 0 if the response to each of the 15 questions was 0, and the maximum value was scaled to 100 if the individual responses for all 15 questions represented the most severe dyspnea response.\n[\n166#6 CHEST DECEMBER 2024\n]", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Acknowledgments\nIn conclusion, our study measured dyspnea impact in individuals with no preexisting diagnosis of lung disease who reported respiratory symptoms as part of a purposeful case /uniFB01 nding strategy. Individuals with PRISm exhibited the greatest impact of dyspnea, even higher than those newly diagnosed with asthma or COPD. After adjusting for patient factors, comorbidities, pulmonary diseases, and severity of lung physiologic impairment, most of the variability in dyspnea remained unexplained. We also showed that dyspnea was associated with increased health care utilization, impaired quality of life, and work productivity.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nTable 4 presents the association of dyspnea with patient-speci /uniFB01 c risk factors. Dyspnea impact increased with younger age, being female, higher BMI, higher smoking and smoke exposure history, and total work\n, 1 = . , 2 = . , 3 = . , 4 = ng,. , 5 = . , 6 = . , 7 = . , 8 = . , 9 = . , 1 = . , 2 = . , 3 = . , 4 = gol. , 5 = . , 6 = snow,. , 7 = . , 8 = My. , 9 = . , 1 = . , 2 = . , 3 = . , 4 = . , 5 = My. , 6 = . , 7 = . , 8 = . , 9 = . , 1 = . , 2 = . , 3 = gardening. , 4 = . , 5 = . , 6 = . , 7 = . , 8 = . , 9 = . Dyspnea, 1 = . Dyspnea, 2 = . Dyspnea, 3 = . Dyspnea, 4 = . Dyspnea, 5 = . Dyspnea, 6 = . Dyspnea, 7 = . Dyspnea, 8 = . Dyspnea, 9 = . Questions About, 1 = . Questions About, 2 = . Questions About, 3 = . Questions About, 4 = . Questions About, 5 = . Questions About, 6 = . Questions About, 7 = . Questions About, 8 = . Questions About, 9 = . , 1 = . , 2 = . , 3 = . , 4 = . , 5 = . , 6 = . , 7 = . , 8 = . , 9 = heavy. , 1 = . , 2 = . , 3 = . , 4 = breathing. , 5 = . , 6 = . , 7 = . , 8 = manual. , 9 = manual. , 1 = . , 2 = . , 3 = . , 4 = . , 5 = carrying. , 6 = . , 7 = . , 8 = swimming,. , 9 = . , 1 = 0.123). , 2 = . , 3 = . , 4 = . , 5 = . , 6 = . , 7 = . , 8 = 0.108). , 9 = ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\noutpatients with cardiorespiratory disease 25 and the Dyspnea-12 in patients with asthma 26 and found that the affective aspect of dyspnea can signi /uniFB01 cantly in /uniFB02 uence the impact of dyspnea on health status, irrespective of the intensity of breathlessness.\nIn those with PRISm, there was a strong, positive association between higher values for the FEV1/FVC ratio and dyspnea. For the PRISm group, a higher FEV1/FVC ratio may re /uniFB02 ect diminished lung compliance due to interstitial lung disease and/or respiratory system restriction due to obesity, which could contribute to worse dyspnea. Conversely, the association of dyspnea with the FEV1/FVC ratio was in the opposite direction for those with asthma or COPD, and a lower FEV1/FVC ratio correlated with worse dyspnea, as expected.\nOur study complements the literature by focusing on adults with undiagnosed respiratory symptoms who were randomly selected and recruited through active case /uniFB01 nding in the community. This increases the generalizability of our results to a broader population. Our dyspnea questions were derived from widely used\nand validated respiratory health questionnaires, and our dyspnea assessment measure is a weighted average of responses to these validated questions. Consequently, the measure has an immediate interpretation in terms of the lived day-to-day experience of individuals.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nAfter adjusting for age, sex, and BMI, dyspnea was associated with an increased likelihood of annual visits to health care providers for respiratory complaints (OR,\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea Regressed on Patient-Speci /uniFB01 c Risk Factors (20.6% of Variability Explained)", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Impact of Dyspnea on Adults With Respiratory Symptoms Without a De /uniFB01 ned Diagnosis\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi /uniFB01 cantly more impactful dyspnea than the control group (mean score, 13.8; 95% CI, 11.8-15.7). Patient-speci /uniFB01 c risk factors including age, sex, BMI, smoking, and comorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the variation was explained by disease classi /uniFB01 cation and another 1.7% by the severity of lung function impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nINTERPRETATION: Our /uniFB01 ndings showed that in community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with PRISm experienced the greatest impact of dyspnea. Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity. CHEST 2024; 166(6):1296-1308\nKEY WORDS: asthma; case /uniFB01 nding; COPD; dyspnea\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n[\n1296\nOriginal Research\n166#6 CHEST DECEMBER 2024\n]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 2 ] (Continued)\nIndividuals with PRISm reported the highest dyspnea impact, with a signi /uniFB01 cantly greater mean score (63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma or COPD (Table 3). Those with undiagnosed asthma or COPD had similar mean scores (56.6; 95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, respectively), followed by those with normal spirometry (51.8; 95% CI, 50.7-52.8). All four groups reported signi /uniFB01 cantly more impactful dyspnea than the control group (mean score, 13.8; 95% CI, 11.815.7). Table 3 shows between-group differences in mean dyspnea impact assessments for each pair of disease outcomes. Figure 2 compares box plots of the dyspnea impact assessment values across disease classi /uniFB01 cations.\n[\n166#6 CHEST DECEMBER 2024\n]\nTABLE 3 ] Intergroup Comparisons of Dyspnea Impact", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "Can I put my plants directly on my compost ?", - "target_page": 2, - "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Tips to Remember:\n· Don't put plants into 100% compost. Mix compost thoroughly into existing soil before planting.\n· When transplanting, it's better to amend the whole bed, not just planting holes, to promote root growth.\n· Ask your compost supplier which compost product is best for your intended use.\n· Use compost at the recommended application rate.\n· To maintain healthy soil, reapply compost or mulch every 1-2 years.\n· Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost.\n· Compost can also reduce your lawn and garden's summer irrigation needs.\n· Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you're helping to protect our precious streams, rivers, lakes, and marine waters.", - "page_start": 1, - "page_end": 1, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Ask Your Compost Supplier\nWhether you're buying direct from the composting facility, or from a local vendor, here are some good questions to ask:\n· What ingredients go into your compost?\n· What compost products or blends do you sell?\n· Are there quality control or testing results available for these products? (These may be on the manufacturer's website.)\n· Which product is best for my intended use?\n· What application rate do you recommend?\n· How much do I need for my area? (Or see pages 4-6.)", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Remember:\nYour compost provider can help you pick the best compost mix for your needs.", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "What is compost?\nCompost is a natural humus-like soil amendment that results from the controlled aerobic (with oxygen) decomposition of organic materials. Compost is not soil - it should be mixed with soil. It is not fertilizer, although it contains many slowly released nutrients.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "The Beauty of Your Lawn and Garden Blossoms from the Soil\nThank you for your interest in compost.\nCompost is a versatile product with many benefits. It enhances soil quality, helps save water, and supports your community's efforts to recycle organic debris. All this helps to conserve our natural resources and reduces the amount of material sent to the landfill.\nCompost-amended soil also helps break down pollutants and absorb stormwater runoff. By making nutrients slowly available to plants and enhancing plant health, compost can reduce the need for chemical fertilizers and pesticides. All these benefits help protect our lakes, rivers, and marine waters from pollution and excessive runoff.\nCompost is a natural amendment for your lawn or garden, and can be used regularly to enrich your soil. This guide is designed to help you get the most from the compost that you buy.", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Compost Beginnings\nThe yard debris or food scraps* that you place into your home compost bin, take to a drop-off site, or set out for curbside collection could become the compost that you later use on your garden, lawn, and flowerbeds.\nIt is essential to place only quality organic material into the composting process. Here are some tips:\nl The products you use or spray in your yard can end up in the compost process. Carefully read the labels of pesticide and herbicide products you use. (See page 9.)\nl Please keep yard debris free of :\nx Garbage\nx Plastic of any sort\n- Plastic plant pots\n- Plastic plant tabs\n- Plastic bags (if you want to bag your yard debris, use paper garden bags - available at most garden centers)\nx Rock, brick, or masonry\nx Glass or metal\nx Pet waste.\n* Many localities now collect food scraps and food-soiled paper along with yard debris for composting. Call your local collection service to find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "3. Finishing:\nTypically 'finished' compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize.\nThe end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil).", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Compost: A Natural Cycle\nComposting is a natural process in which microorganisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crumbly soil amendment. Modern compost facilities use the same natural biological composting process.\nTheir controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases.\nCompost improves soil structure and plant growth by\n· Replenishing soil organic matter, and storing nutrients in plant-available forms\n· Supporting beneficial soil life\n· Reducing erosion and water run-off\n· Loosening clay soils for better root development (increasing soil pore space)\n· Retaining moisture in sandy soils so plants need less watering.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Selecting Quality Compost\nCompost is available in many product types and blends that may be used for different gardening applications. The type of feedstock, the composting process, and any supplementary additives determine the end product.\nMany facilities offer a variety of blends based on compost, such as garden mix, potting soil, planting mix, mulches, turf top-dressing and soil blends.", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "What to Look for in Compost\nFor most compost applications you will want a finished product that has matured and stabilized. Look for material\nl with a dark, crumbly texture\nl with a mild odor\nFor most compost applications you will not want compost that is extremely dry or wet, or extremely hot. (Note that it is okay for compost to be warm and to give off some steam and mild odor.)", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "What are fertilizers ?", - "target_page": 4, - "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "What is compost?\nCompost is a natural humus-like soil amendment that results from the controlled aerobic (with oxygen) decomposition of organic materials. Compost is not soil - it should be mixed with soil. It is not fertilizer, although it contains many slowly released nutrients.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "The Beauty of Your Lawn and Garden Blossoms from the Soil\nThank you for your interest in compost.\nCompost is a versatile product with many benefits. It enhances soil quality, helps save water, and supports your community's efforts to recycle organic debris. All this helps to conserve our natural resources and reduces the amount of material sent to the landfill.\nCompost-amended soil also helps break down pollutants and absorb stormwater runoff. By making nutrients slowly available to plants and enhancing plant health, compost can reduce the need for chemical fertilizers and pesticides. All these benefits help protect our lakes, rivers, and marine waters from pollution and excessive runoff.\nCompost is a natural amendment for your lawn or garden, and can be used regularly to enrich your soil. This guide is designed to help you get the most from the compost that you buy.", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Comparing Landscape Products\nA variety of soil and landscape products are sold. Here's a comparison:\nCompost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth.\nMulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Tips to Remember:\n· Don't put plants into 100% compost. Mix compost thoroughly into existing soil before planting.\n· When transplanting, it's better to amend the whole bed, not just planting holes, to promote root growth.\n· Ask your compost supplier which compost product is best for your intended use.\n· Use compost at the recommended application rate.\n· To maintain healthy soil, reapply compost or mulch every 1-2 years.\n· Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost.\n· Compost can also reduce your lawn and garden's summer irrigation needs.\n· Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you're helping to protect our precious streams, rivers, lakes, and marine waters.", - "page_start": 1, - "page_end": 1, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Selecting Quality Compost\nCompost is available in many product types and blends that may be used for different gardening applications. The type of feedstock, the composting process, and any supplementary additives determine the end product.\nMany facilities offer a variety of blends based on compost, such as garden mix, potting soil, planting mix, mulches, turf top-dressing and soil blends.", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Healthy Soil:\nl Is teeming with life! Healthy soil is a miniature ecosystem. A teaspoon of healthy soil will have upwards of four billion tiny organisms which recycle nutrients, suppress disease, and discourage pests.\nl Retains moisture but allows drainage. Healthy soil has structure that allows water to drain through, retains moisture, and promotes strong root growth.\nl Is full of organic nutrients. Plants depend on the microorganisms found in healthy organic-rich soil to provide nutrients to their roots, and help them thrive.\nA healthy garden and landscape is naturally resistant to pests, drought, weeds, and diseases. Maintaining healthy soil may allow you to reduce use of chemical fertilizers and pesticides.\nSoil is a planting medium. Compost is a soil amendment. Do not place plants directly into 100% compost. Ask your supplier or see next page for mixes for different uses.", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "What materials ('feedstocks') are used to make compost?\nCompost facilities in Washington recycle a variety of organic materials, including yard debris, food scraps, manure, biosolids, forest residuals like sawdust and bark, construction wood, and agricultural residues. All of these materials can be used to produce high quality compost. Your supplier can tell you which materials they compost.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "2.2.9. Reducing pollution\nPollution is a key driver of biodiversity loss and has a harmful impact on our health and environment. While the EU has a solid legal framework in place to reduce pollution, greater efforts are still required. Biodiversity is suffering from the release of nutrients, chemical pesticides, pharmaceuticals, hazardous chemicals, urban and industrial wastewater, and other waste including litter and plastics. All of these pressures must be reduced.\nAs part of the Commission's Zero Pollution Ambition for a toxic-free environment, a new EU Chemicals Strategy for Sustainability will be put forward along with a Zero Pollution Action Plan for Air, Water and Soil .\nThe Commission will also promote the goal of zero pollution from nitrogen and phosphorus flows from fertilisers through reducing nutrient losses by at least 50%, while ensuring that there is no deterioration in soil fertility. This will result in the reduction of use of fertilisers by at least 20% . This will be achieved by implementing and enforcing the relevant environmental and climate legislation in full, identifying with Member States the nutrient load reductions needed to achieve these goals, applying balanced fertilisation and sustainable nutrient management, and by managing nitrogen and phosphorus better throughout their lifecycle. To this end, the Commission will work with Member States to\n52 There are 11,000 Natura 2000 sites within, or partly within, cities, representing 15% of the total area of the Natura 2000 network.\n53 The Green City Accord.\n13\ndevelop an Integrated Nutrient Management Action Plan in 2022. The Farm to Fork strategy will address the reduction in the use and risk of pesticides and support wider implementation of Integrated Pest Management 54 . As part of this, the environmental risk assessment of pesticides will be strengthened . The pressure from plastics is notably addressed through the implementation of the European Strategy for Plastics 55 and the new Circular Economy Action Plan 56 .\nThe Commission will develop a set of indicators for the progressive reduction of pollution , and will establish baselines to help monitor progress. Pressures from marine litter and underwater noise are being addressed under the Marine Strategy Framework Directive.", - "page_start": 13, - "page_end": 14, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Ask Your Compost Supplier\nWhether you're buying direct from the composting facility, or from a local vendor, here are some good questions to ask:\n· What ingredients go into your compost?\n· What compost products or blends do you sell?\n· Are there quality control or testing results available for these products? (These may be on the manufacturer's website.)\n· Which product is best for my intended use?\n· What application rate do you recommend?\n· How much do I need for my area? (Or see pages 4-6.)", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "3. Finishing:\nTypically 'finished' compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize.\nThe end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil).", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "Explain to me what is peat moss ?", - "target_page": 4, - "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Comparing Landscape Products\nA variety of soil and landscape products are sold. Here's a comparison:\nCompost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth.\nMulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "YOU WOOD LOVE ME\nOf course, you wood love the new me even more, since I thrive on change and selfimprovement. Seek a seeker of all things bold and beautiful - someone who desires elegant solutions and tailored style, and who appreciates handcrafted expressions of commitment. I'm easy to be around, and I'm certain I could fit into both your life and your office. Let's create a new way of being - together.\nGUNLOCKE", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "2.2.4. Increasing the quantity of forests and improving their health and resilience\nForests are hugely important for biodiversity, climate and water regulation, the provision of food, medicines and materials, carbon sequestration and storage, soil stabilisation and the purification of air and water. They are also a natural home for recreation and learning about nature. Foresters have a key role to play in ensuring sustainable forest management and in restoring and sustaining biodiversity in forests.\nIn addition to strictly protecting all remaining EU primary and old-growth forests, the EU must increase the quantity, quality and resilience of its forests , notably against fires, droughts, pests, diseases and other threats likely to increase with climate change. To retain their function for both biodiversity and climate, all forests need to be preserved in good health. More resilient forests can support a more resilient economy. They also play an important role in providing materials, products and services, which are key for the circular bio-economy.\nTo make this happen, the Commission will propose a dedicated EU Forest Strategy in 2021 in line with our wider biodiversity and climate neutrality ambitions. It will include a roadmap for planting at least 3 billion additional trees in the EU by 2030 , in full respect of ecological principles. This will create substantial job opportunities linked to the collecting and cultivating of seeds, planting seedlings, and ensuring their development. Tree planting is particularly beneficial in cities, while in rural areas it can work well with agroforestry, landscape features and increased carbon sequestration. At the same time, the Commission will continue to work with Member States to ensure that the EU is sufficiently equipped to prevent and respond to major forest fires, which can inflict significant damages on forest biodiversity.\n35 European Court of Auditors (2018), Combating desertification in the EU: a growing threat in need of more action, Special Report n°33/2018.\n36 Thematic Strategy for Soil Protection (COM(2006) 231).\n37 Horizon Europe mission area on soil health and food.\n9\nAfforestation, reforestation and tree planting to support biodiversity and ecosystem restoration will be promoted through the CAP Strategic Plans, and the Cohesion Policy funds. The new European Urban Greening Platform 38 will also facilitate urban tree planting, including under the LIFE programme.", - "page_start": 9, - "page_end": 10, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Get help with Word\nThe Tell me search box takes you straight to commands and Help in Word.", - "page_start": 7, - "page_end": 7, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Compost: A Natural Cycle\nComposting is a natural process in which microorganisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crumbly soil amendment. Modern compost facilities use the same natural biological composting process.\nTheir controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases.\nCompost improves soil structure and plant growth by\n· Replenishing soil organic matter, and storing nutrients in plant-available forms\n· Supporting beneficial soil life\n· Reducing erosion and water run-off\n· Loosening clay soils for better root development (increasing soil pore space)\n· Retaining moisture in sandy soils so plants need less watering.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Example:\n'I have been offered an opportunity to work as an IT Manager abroad, and I have decided to accept the offer.'\n'I would like to thank you for the wonderful opportunities you have given me, both to develop my skills, and to work with such knowledgeable and inspiring people.'", - "page_start": 49, - "page_end": 49, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFerromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material. The realization of spin-valve devices from FM semiconductors requires the controlled switching of magnetization in adjacent layers between antiferromagnetic (AFM) and FM configurations. This has motivated several theoretical investigations of interlayer coupling in all-semiconductor devices 1 , and AFM coupling has recently been demonstrated in (Ga,Mn)As multilayers separated by p -type non-magnetic spacers 2 . However, the Curie temperature T C of (Ga,Mn)As is currently limited to 185 K in single layers 3 , and is typically much lower for layers embedded within a heterostructure 2 , which is an obstacle to the practical implementation of semiconductor spintronics.\nThe development of FM metal/FM semiconductor heterostructures has the potential to bring together the benefits of metal and semiconductor based spintronics, offering access to new functionalities and physical phenomena. Recent studies of MnAs/(Ga,Mn)As and NiFe/(Ga,Mn)As bilayer films have shown FM interlayer coupling and independent magnetization behavior, respectively 4,5 . Of particular interest is the Fe/(Ga,Mn)As system, since the growth of epitaxial Fe/GaAs(001) films is well-established 6 . Remarkably, a recent x-ray magnetic circular dichroism (XMCD) study has shown that Fe may induce a proximity polarization in the near-surface region of (Ga,Mn)As, antiparallel to the Fe moment and persisting even above room temperature 7 . Devices incorporating Fe/(Ga,Mn)As therefore offer the prospect of obtaining non-volatile room temperature spin-polarization in a semiconductor.\nUntil now, no information has been revealed about the coupling of Fe to (Ga,Mn)As layers away from the nearsurface region. At the surface, the (Ga,Mn)As layer may be highly non-stoichiometric and Mn-rich, due to its nonequilibrium nature 8,9 . Previously, Fe/(Ga,Mn)As layers were produced by a process including exposure to air followed by sputtering and annealing prior to Fe deposition,", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "I. INTRODUCTION\nbe achieved with different number of interacting layers: notably, nearest and next-nearest layers competitive interactions are enough to get a helical structure with a whatever pitch wavevector. Such observation gives us a possible way to solve the conundrum previously emerged, as we have the possibility of varying the range of interactions without modifying the helical pitch, thus decoupling the two relevant length scales along the film growth direction, and making accessible a range of n of the order of, or smaller than, the helical pitch, but still large enough that a substantial number of layers can behave as 'bulk' layers. Therefore, while in the previous papers we have studied the properties of ultrathin magnetic films of Ho assuming a model with six interlayer exchange interactions, here we investigate by MC simulations the properties of the same system by making use of the simplest model Hamiltonian able to describe the onset of a helical magnetic order in Holmium, i.e. we consider only two inter-layer coupling constants, as previously done in Ref. 11.\nThe paper is organized as follows: In Sec. II the model Hamiltonian will be defined, and the MC techniques, and all the thermodynamic quantities relevant for this study, will be introduced. In Sec. III the results obtained for different thicknesses will be presented, both in the matter of the critical properties of the model and of the magnetic ordered structures observed. Finally, in Sec. IV we shall discuss such results, drawing also some conclusions.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nIn summary, we have demonstrated antiferromagnetic coupling between Fe and (Ga,Mn)As layers in bilayer structures. A markedly different coupling is observed for the bulk of the (Ga,Mn)As layer and for Mn moments in the near-interface region. A thickness-dependent exchange bias field is observed to affect the whole of the bulk (Ga,Mn)As layer, which aligns antiparallel to the Fe layer at low fields, and switches to parallel when the external field is large enough to overcome the bias field and the magnetocrystalline anisotropy fields. In contrast, the interfacial Mn moments remain aligned antiparallel to the Fe layer even at 20 kOe, the largest field studied, and are polarized at temperatures well above the T C of the bulk (Ga,Mn)As layer. The latter observation confirms the recently reported result of Ref. 7, in which the Fe/(Ga,Mn)As bilayers were produced by a different method but showed qualitatively similar behavior of the interfacial moments. Our results shed new light on the magnetic coupling in Fe/(Ga,Mn)As hybrid layers which are of potential interest for room temperature spintronics, and also offer a means of controlling the spin orientation in a FM semiconductor.\nWe acknowledge support from EU grants SemiSpinNet-215368 and NAMASTE-214499, and STFC studentship grant CMPC07100. The Advanced Light Source is supported by the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. We thank Leigh Shelford for help during the Diamond beamtime.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "3. Finishing:\nTypically 'finished' compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize.\nThe end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil).", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "How encourage temporally adjacent representations to be predictive of each other ?", - "target_page": 2, - "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "2 Related Works\nSlow Features. One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. Early works targeting predictive features encouraged representations of individual video frames to be locally temporally invariant, while preventing representation collapse by using spectral methods, as in SFA (Wiskott and Sejnowski, 2002), SSA (Kayser et al., 2001), and Simulated Fixations (Zou et al., 2012). More recently, Goroshin et al. (2015); Wang et al. (2010) train a siamese convolutional network to map the representations of two subsequent frames to the same point, while encouraging distant frames to have diverse representations via a pairwise margin loss and a triplet loss, respectively. Other works (Oord et al., 2018; Surís et al., 2021; Feichtenhofer et al., 2021) implement temporal invariance using noisecontrastive estimation (Gutmann and Hyvärinen, 2012). Our exploration in this paper goes beyond temporal in-\n2\nriance and explores feature prediction using masked modeling.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv3.pdf" - }, - { - "text": "1 Introduction\nHumans possess the remarkable ability to map low-level signals originating from the retina into a semantic spatiotemporal understanding of the world; synthesizing notions such as objects and global motion (Spelke et al., 1995). A long-standing goal of the machine learning community is to identify the principles or objectives that may guide such unsupervised learning in humans (Field, 1994; Berkes and Wiskott, 2005; Hinton, 1989). One related hypothesis is based on the predictive feature principle (Rao and Ballard, 1999), which posits that representations of temporally adjacent sensory stimuli should be predictive of each other.\nIn this work, we revisit feature prediction as a standalone objective for unsupervised learning of visual representations from video. Numerous advances in the field such as the standard use of transformer architectures in vision (Dosovitskiy et al., 2020), the maturing of masked autoencoding frameworks (Xie et al., 2021; Bao et al., 2021; He et al., 2021), query-based feature pooling (Chen et al., 2022), joint-embedding predictive architectures (JEPA) (LeCun, 2022; Assran et al., 2023; Baevski et al., 2022b), and larger datasets - form a unique arsenal of tools, which we integrate in a modern and conceptually simple method, the video joint-embedding predictive architecture or V-JEPA , which is based solely on feature prediction, without using pretrained image encoders, text, negative examples, human annotations, or pixel-", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv3.pdf" - }, - { - "text": "3 Methodology: Video-JEPA\nFigure 2 Joint-Embedding Predictive Architectures are trained to predict the representation of an input y from the representation of another input x . The additional variable z provides the predictor with information about the transformation that computes y from x .\nOur goal is to explore the effectiveness of feature prediction as a stand-alone objective for learning visual representations from video. To that end, we use a joint-embedding predictive architecture (JEPA) (LeCun, 2022); see Figure 2. The main idea behind a JEPA is to learn by predicting the representation of an input y from the representation of another input x . The basic architecture is made up of an encoder, E θ ( · ) , which computes the representation of the inputs, and a predictor, P ϕ ( · ) , which predicts the representation of y from the representation of x , conditioned on a variable z indicating the transformation (or corruption) between x and y . Conditioning on z enables the generation of distinct predictions for various transformations of x .", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "Self-Supervised Learning from Videos\nSimilar to unsupervised learning from images, a family of unsupervised video representation learning approaches enforces a spatio-temporal representation of a video clip to be invariant to hand-crafted spatio-temporal data augmentations (Parthasarathy et al., 2022). However, one obvious insight is that the temporal ordering of visual information in video can provide implicit supervision. Indeed, this insight is the key insight leveraged by many works on unsupervised video learning. Towards leveraging temporal information as supervision, some approaches train a visual encoder by predicting the temporal ordering of frames (Xu et al., 2019; Lee et al., 2017). Other approaches seek to predict low-level motion vectors computed from optical flow (Pintea et al., 2014), or to predict mixing pixels in video frames, using either a frame-interpolation objective (Kalluri et al., 2023) or a denoising autoencoder (Tong et al., 2022; Feichtenhofer et al., 2022; Wang et al., 2023a).\n15", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv3.pdf" - }, - { - "text": "2 Related Works\nPredictive Features. Going beyond local invariance, a family of works trains a predictor network to map the representation of a frame or clip at one time-step to a distinct representation at another time-step. Srivastava et al. (2015); Vondrick et al. (2016); Wang et al. (2023b) train such a video feature predictor network on top of a frozen pretrained image or video encoder. Unfreezing the target feature extractor, several methods train the video encoder and the predictor network simultaneously, while preventing collapse by using a supervised action forecasting loss (Girdhar and Grauman, 2021), or by using the representations of distant clips as negative samples in a contrastive loss (Han et al., 2019, 2020; Tan et al., 2023), often focusing on small convolutional encoders (Han et al., 2019, 2020). The idea of learning a representation by predicting missing information in feature space is also core to the joint-embedding predictive architecture (JEPA) (LeCun, 2022), which combines a siamese encoder with a predictor network. JEPAs have been successfully instantiated in several modalities, such as with audio data (Baevski et al., 2022b) and image data (Zhou et al., 2021; Oquab et al., 2023; Assran et al., 2023). In this work, we extend this paradigm to video data by leveraging recent advances in self-supervised learning.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv3.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nFigure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) sensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with temporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and Ballard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are reciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, the pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on units encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in cortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need to map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower and intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for exteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks that process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. (2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their putative neuronal underpinnings. See online article for colored version of this figure.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nare reciprocally linked through top-down connections that convey predictions (black edges) and bottom-up connections that convey prediction errors (red edges), within and across levels. This predictive coding architecture permits inferring (in the Bayesian sense) the most likely causes of sensations, across multiple modalities and multiple hierarchical levels, by minimizing prediction errors at all levels. The rationale is that predictions at all levels are continuously adjusted (and synaptic weights adjusted at a slower time scale) until they match with incoming multimodal stimuli sufficiently well, and, consequently, the prediction errors across all levels are minimized. This process entails that even if a predictive coding agent starts with an incorrect prediction (e.g. about what object it is looking at) the prediction errors that measure a discrepancy between the predicted sensations and the actual sensations can help revise the initial predictions. See Parr et al. (2022) for a more detailed explanation of how to interpret these schematics.\nAnother critical aspect of Fig. 1 is that it illustrates two pathways in which prediction errors at the proprioceptive and interoceptive levels are used to steer physical actions (reflex arcs) and autonomic actions (autonomic reflexes). Endowing predictive coding with these reflexes-hence realizing an 'active inference' architecture-permits minimizing prediction errors by changing the state of the world (by physically acting) or the internal milieu (by engaging in autonomic actions) rather than only by changing predictions, as described later.\nEquipped with a generative model like the one shown in Fig. 1, an active inference agent can continuously infer (and act upon) the state of the world and of the body, including the internal milieu, at multiple time scales. Of particular interest, here are multimodal inferences that unite exteroceptive and interoceptive sources of evidence. One example of this is the perception of faces expressing emotions. Two studies reported that\n6 Barca et al.", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "3.1 Training Objective\nWe train our visual encoder E θ ( · ) to satisfy the constraint that representations computed from one part of the video, y , should be predictable from representations\n3\ncomputed from another part of the video, x . The predictor network P ϕ ( · ) , which maps the representation of x to the representation of y , is trained simultaneously with the encoder, and is provided specification of the spatio-temporal positions of y through the conditioning variable z ← ∆ y .\nNaively implementing the objective using the regression\nminimize θ,ϕ ∥ P ϕ ( E θ ( x ) , ∆ y ) -E θ ( y ) ∥ 1 ,\nwould admit a trivial solution, where the encoder outputs a constant representation, regardless of its input. In practice, we use the following modified objective to prevent representation collapse,\nminimize θ,ϕ ∥ P ϕ ( E θ ( x ) , ∆ y ) -sg ( E θ ( y )) ∥ 1 , (1)\nwhere sg ( · ) denotes a stop-gradient operation, which does not backpropagate through its argument, and E θ ( · ) is an exponential moving average of the network E θ ( · ) . The use of an exponential-moving average feature extractor along with a stop-gradient and a predictor has been used as a collapse prevention strategy for image pretraining (Grill et al., 2020), and studied empirically (Xie et al., 2021) and theoretically (Tian et al., 2021). In fact, the objective in equation (1) is similar to the loss of Assran et al. (2023) used for image pretraining, but we modify it to use an ℓ 1 regression, which we found to be more stable.\nTheoretical motivation. A theoretical motivation for the effectiveness of this collapse prevention strategy was proposed in Grill et al. (2020) for the BYOL method. We provide a simple adaptation of their analysis for our ℓ 1 loss. For ease of exposition, we will disregard the effect of the conditioning variable z and consider one dimensional representations. Denote the representation E θ ( y ) by a random variable Y . The optimal predictor under equation (1) is thus given by the following functional expression,\nP ⋆ ( E θ ( x )) = argmin P ∥ P ( E θ ( x )) -Y ∥ 1 = median ( Y | E θ ( x )) .", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "Frozen Evaluation\nFigure 1 V-JEPA models pretrained on video learn versatile visual representations. It performs well on motion-based tasks (Something-Something-v2) and appearance-based tasks (Kinetics 400) without adaptation of the model's parameters, i.e., using the same frozen backbone for both tasks.\nlevel reconstruction.\nWe seek to answer the simple question:\nHow effective is feature prediction as a standalone objective for unsupervised learning from video with modern tools?\n1\nTo that end, we pretrain a family of V-JEPA models on a dataset of 2 million videos collected from publicly available datasets by combining a masked modeling prediction task with a joint-embedding predictive architecture (see Figure 2). We measure performance on several downstream image and video tasks, using both frozen evaluation and end-to-end fine-tuning. Our findings suggest that feature prediction can indeed serve as an effective stand-alone objective for unsupervised learning from video, while using significantly shorter training schedules than pixel prediction methods. Specifically:\n· Feature prediction leads to versatile visual representations that perform well across downstream image and video tasks without adaption of the model's weights; i.e., using a frozen backbone. V-JEPA achieves the best performance among methods we consider (+6% accuracy) on the SomethingSomething-v2 task, which requires finegrained temporal understanding. V-JEPA is also competitive on tasks like Kinetics400, where appearance-based features are sufficient and hence state-of-the-art image models such as DINOv2 excel (Figure 1 and Table 6).\n· Models trained with feature prediction are superior to pixel prediction approaches under a frozen evaluation protocol (attentive probing) and are competitive with pixel prediction under full fine-tuning, while using significantly shorter training schedules (Tables 5 and 6).\n· Models trained with feature prediction are more label-efficient than pixel prediction approaches. Decreasing the available number of labeled examples results in an increase in the performance gap between V-JEPA and pixel-reconstruction models (Table 7).", - "page_start": 0, - "page_end": 1, - "source_file": "arxiv3.pdf" - }, - { - "text": "6 Evaluating the Predictor\nNext, we seek to qualitatively inspect the V-JEPA models. Recall that the predictor network in V-JEPA predicts the representations of a masked spatio-temporal region y from a visible region x , given the positional information of the masked regions (see Section 3). To qualitatively investigate the grounding of the feature-space predictions, we freeze the pretrained encoder and predictor networks and train a conditional diffusion decoder to map the V-JEPA predictions to interpretable pixels. Notably, the decoder is only fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions of the video (see Figure 6a).\nGiven a masked video, we use the V-JEPA pretrained models to predict the representations of the missing regions, and then use the decoder to project the representations to pixel space. Figure 6b shows decoder outputs for various random seeds. Qualities that are common across samples represent information that is contained in the predictor representation.\nFigure 6b shows that the V-JEPA feature predictions are indeed grounded, and exhibit spatio-temporal consistency with the unmasked regions of the video. Specifically, the samples in Figure 6b show that the V-JEPA predictor correctly captures positional uncertainty and produces a variety of visual objects at various locations with consistent motion. Some of the samples also demonstrate an understanding of object-permanence, as the visual objects remain consistent after partial occlusion.\n9", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "What does mean the JEPA acronym ?", - "target_page": 3, - "target_passage": " joint-embedding predictive architecture (JEPA)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 examines both frozen evaluation with an attentive probe on downstream video and image tasks, as well as end-to-end fine-tuning. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where we achieve 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on Im-\n8 × 3) = 82.0 81.9. V-JEPA, Video Tasks.SSv2 (16 × 2 × 3) = 71.4 72.2. V-JEPA, Video Tasks.AVA = 25.8 25.0. V-JEPA, Image Tasks.IN1K = 75.9 77.4. V-JEPA, Image Tasks.Places205 = 61.7 62.8. V-JEPA, Image Tasks.iNat21 = 67.9 72.6", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 examines both frozen evaluation with an attentive probe on downstream video and image tasks, as well as end-to-end fine-tuning. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where we achieve 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on Im-\n71.2. VideoMAEv2, Video Tasks.SSv2 (16 × 2 × 3) = 61.2. VideoMAEv2, Video Tasks.AVA = 12.9. VideoMAEv2, Image Tasks.IN1K = 71.4. VideoMAEv2, Image Tasks.Places205 = 60.6. VideoMAEv2, Image Tasks.iNat21 = 68.3. Hiera, Arch. = Hiera-H. Hiera, Params. = 670M. Hiera, Data = K400. Hiera, Video Tasks.K400 (16 × 8 × 3) = 77.0. Hiera, Video Tasks.SSv2 (16 × 2 × 3) = 64.7. Hiera, Video Tasks.AVA = 17.5. Hiera, Image Tasks.IN1K = 71.4. Hiera, Image Tasks.Places205 = 59.5. Hiera, Image Tasks.iNat21 = 61.7. V-JEPA, Arch. = ViT-L/16. V-JEPA, Params. = 200M. V-JEPA, Data = VideoMix2M. V-JEPA, Video Tasks.K400 (16 × 8 × 3) = 80.8. V-JEPA, Video Tasks.SSv2 (16 × 2 × 3) = 69.5. V-JEPA, Video Tasks.AVA = 25.6. V-JEPA, Image Tasks.IN1K = 74.8. V-JEPA, Image Tasks.Places205 = 60.3. V-JEPA, Image Tasks.iNat21 = 67.8. V-JEPA, Arch. = ViT-H/16 ViT-H/16 384. V-JEPA, Params. = 630M 630M. V-JEPA, Data = VideoMix2M. V-JEPA, Video Tasks.K400 (16 ×", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "5.2 Comparison with State-of-the-Art\nTable 7 Low-Shot Frozen Evaluation. Comparing V-JEPA to other video models in frozen evaluation on Kinetics-400 and Something-Something-v2 as we vary the percentage of labeled examples from each dataset available for training the attentive probe. We train the probes in several low-shot settings: using either 5% of the train set, 10%, or 50%, and take 3 random splits in each setting to obtain more robust metrics, resulting in 9 different evaluation experiments for each model. We report the mean performances and standard deviation using the K400 and SSv2 validation sets. V-JEPA is more label-efficient than other models; specifically, decreasing the available number of labeled examples from each class increases the performance gap between V-JEPA and the baselines.\nViT-H/16. V-JEPA, Frozen Evaluation.K400 (16 × 8 × 3).5% ∼ 29 samples per class) = 67.0 ± 0.2. V-JEPA, Frozen Evaluation.K400 (16 × 8 × 3).10% ∼ 58 samples per class) = 72.1 ± 0.1. V-JEPA, Frozen Evaluation.K400 (16 × 8 × 3).50% 287 samples per class) = 80.2 ± 0.2. V-JEPA, Frozen Evaluation.SSv2 (16 × 2 × 3).5% ∼ 48 samples per class) = 51.9 ± 0.3. V-JEPA, Frozen Evaluation.SSv2 (16 × 2 × 3).10% ∼ 96 samples per class) = 57.5 ± 0.4. V-JEPA, Frozen Evaluation.SSv2 (16 × 2 × 3).50% 440 samples per class) = 67.3 ± 0.2. V-JEPA, Arch. = ViT-H/16 384. V-JEPA, Frozen Evaluation.K400 (16 × 8 × 3).5% ∼ 29 samples per class) = 68.2 ± 0.2. V-JEPA, Frozen Evaluation.K400 (16 × 8 × 3).10% ∼ 58 samples per class) = 72.8 ± 0.2. V-JEPA, Frozen Evaluation.K400 (16 × 8 × 3).50% 287 samples per class) = 80.6 ±", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n75.1. V-JEPA, Arch. = ViT-L/16. V-JEPA, #Samples", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nSeen = 270M. V-JEPA, Iter. = 90K. V-JEPA, Frozen Evaluation w/", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nV-JEPA, Frozen Evaluation w/ Att. Pooling.AVA = 25.6. V-JEPA,", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "Frozen\n(a) Visualization Methodology. We train a conditional diffusion model to decode the V-JEPA feature-space predictions to interpretable pixels; the pretrained V-JEPA encoder and predictor networks are kept frozen in this process. The decoder is only fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions of the video.\nFigure 6 Qualitative Analysis. Offline visualizations of the V-JEPA feature-space predictions.\n(b) Visualizations. First Row: Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its corresponding predictor network). Other rows: Bounding boxes contain various samples from the decoder overlayed on the original video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do not expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and predicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in the V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the video. The predictions also capture consistent motion through time.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv3.pdf" - }, - { - "text": "E.4 Masking Strategy\nTable 15 Finetuning results. We evaluate a V-JEPA model with the finetuning protocol on the K400 and SSv2 datasets using 16 frames per clip and multi-view fusion (5 × 3 or 2 × 3 ) for inference. The #Samples Seen entry corresponds to the number of video clips processed during pretraining, which is larger than the size of the pretraining dataset for multi-epoch training. We compare V-JEPA with different video self-supervised learning approaches. We report the VideoMAEv2 results without instruction-turning for consistency with the other approaches. V-JEPA obtains competitive performance using the finetuning protocol.\nVideoMAE, Arch. = ViT-L/16. VideoMAE, 1 Clip = 69.4. VideoMAE, 8 Clips = 77.8. V-JEPA, Arch. = ViT-L/16. V-JEPA, 1 Clip = 73.7. V-JEPA, 8 Clips = 80.9", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nw/ Att. Pooling.Places205 = 60.3. V-JEPA, iNat21 =", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n67.8. V-JEPA, Fine-Tuning.K400-ft (16 × 5 × 3) =", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "What is the average performance of the ViT-L/16 architecture on the K710 dataset with 700k samples ?", - "target_page": 5, - "target_passage": "70.9", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3.4 Pretraining Data and Evaluation Setup\nViT-L/16, Data = K710. ViT-L/16, #Samples = 700K. ViT-L/16, Frozen Evaluation.K400 (16 × 1 × 1) = 75.8. ViT-L/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 63.2. ViT-L/16, Frozen Evaluation.IN1K = 73.7. ViT-L/16, Avg. = 70.9. ViT-L/16, Data = K710+SSv2. ViT-L/16, #Samples = 900K. ViT-L/16, Frozen Evaluation.K400 (16 × 1 × 1) = 72.9. ViT-L/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 67.4. ViT-L/16, Frozen Evaluation.IN1K = 72.8. ViT-L/16, Avg. = 71.0. ViT-L/16, Data = K710+HT. ViT-L/16, #Samples = 1900K. ViT-L/16, Frozen Evaluation.K400 (16 × 1 × 1) = 74.5. ViT-L/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 64.2. ViT-L/16, Frozen Evaluation.IN1K = 74.8. ViT-L/16, Avg. = 71.1. , Data = VideoMix2M. , #Samples = 2000K. , Frozen Evaluation.K400 (16 × 1 × 1) = 73.7. , Frozen Evaluation.SSv2 (16 × 1 × 1) = 66.2. , Frozen Evaluation.IN1K = 74.8. , Avg. = 71.5. ViT-H/16, Data = K710+SSv2. ViT-H/16, #Samples = 900K. ViT-H/16, Frozen Evaluation.K400 (16 × 1 × 1) = 75.7. ViT-H/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 66.8. ViT-H/16, Frozen Evaluation.IN1K = 73.7.", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "D.1 Frozen classification\nTable 10 Frozen Detection hyper-parameters.\nout_layers, ViT-L/16 = [18, 20, 22, 24] [26, 28, 30, 32]. out_layers, ViT-H/16 = . batch_size, ViT-L/16 = 64. batch_size, ViT-H/16 = 64. epochs, ViT-L/16 = 30. epochs, ViT-H/16 = 30. opt, ViT-L/16 = AdamW. opt, ViT-H/16 = AdamW. opt_eps, ViT-L/16 = 0.00000001. opt_eps, ViT-H/16 = 0.00000001. momentum, ViT-L/16 = 0.9. momentum, ViT-H/16 = 0.9. weight_decay, ViT-L/16 = 0.05. weight_decay, ViT-H/16 = 0.05. lr, ViT-L/16 = 0.0001. lr, ViT-H/16 = 0.0001. warmup_lr, ViT-L/16 = 0.000001. warmup_lr, ViT-H/16 = 0.000001. min_lr, ViT-L/16 = 0.000001. min_lr, ViT-H/16 = 0.000001. warmup_epochs, ViT-L/16 = 2. warmup_epochs, ViT-H/16 = 2. warmup_steps, ViT-L/16 = 1. warmup_steps, ViT-H/16 = 1", - "page_start": 18, - "page_end": 18, - "source_file": "arxiv3.pdf" - }, - { - "text": "3.4 Pretraining Data and Evaluation Setup\nPretraining. We combine several public datasets to construct an unsupervised video pretraining dataset, which we refer to as VideoMix2M. Specifically, we combine the videos from HowTo100M (HT) (Miech et al., 2019), Kinetics-400/600/700 (K710) (Kay et al., 2017), and Something-Something-v2 (SSv2) (Goyal et al., 2017), and remove any overlap with the validation sets of Kinetics-400/600/700 and Something-Something-v2, resulting in approximately 2 million videos. We train a ViT-L/16, a ViT-H/16, and a ViT-H/16 384 transformer model on VideoMix2M. We use a batch size of 3072 for the ViT-L/16 and ViT-H/16 models, and a batch size of 2400 for the ViT-H/16 384 model. Each model takes as input a video clip of 16 frames sampled with a frameskip of 4, corresponding to roughly 3 second clips on average. The ViT-L/16 and ViT-H/16 process the video at a spatial resolution of 224, while the ViT-H/16 384 uses an input resolution of 384; cf. Appendix C.\n4\nTable 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All models are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We examine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single center view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide a consistent improvement over pixel space prediction.\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate downstream performance of the frozen backbones with an attentive probe using a single center view. Average performance across tasks increases with the pretraining dataset size.", - "page_start": 3, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "4.2 Pretraining Data Distribution\nhas been critical for enabling the surge of advancements in other modalities, such as text and images (Kaplan et al., 2020; Cherti et al., 2023). We investigate whether a similar trend holds for video data. To control for the possible confounding variable of compute budget, we pretrain all models in Table 2 for 90K iterations using a batch-size of 3072. We report downstream results on K400, SSv2, and IN1K using a frozen backbone with an attentive probe, and report top-1 accuracy using a single center view.\nTable 2 shows that average performance across tasks monotonically increases as we increase the size of the pretraining dataset, but the best task-specific performance is obtained by independently selecting the pretraining data for each specific downstream task. For instance, the L/16 obtains its best SSv2 performance when pretrained on K710+SSv2, its best K400 performance when pretrained only on K710, and its best IN1K performance when pretrained only on K710+HT. The best average performance across all tasks is achieved by pretraining VideoMix2M, which combines all the data sources. Similarly, the H/16 pretrained on K710+SSv2 achieves a greater K400 score than the H/16 pretrained on VideoMix2M, however, the top performing H/16 on average is pretrained on VideoMix2M.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv3.pdf" - }, - { - "text": "3.1.2 HAL (Clustering)\n· Samples belonging to domain classes with less than 500 samples were removed, which leads us to keep only 10 classes.\n· Subsampling was performed on 2 classes containing more than 10k samples each to lower the number of samples and mitigate the unbalance of the dataset.\nMore details about this process are provided in the appendix A.2 along with some extracts in Figure 6. We make the dataset publicly available in both their raw and clean versions. We use this dataset in a clustering setup to cluster publications by their title and use the domain as ground truth. To ensure the quality of this dataset, we run 3 baseline models for classification: TF-IDF + SVM , a fine-tuned Camembert (Martin et al., 2019) and GPT-4 leveraging In-Context Learning (ICL). Furthermore, we run one baseline model for topic modeling: Latent Dirichlet Allocation (LDA) (Blei et al., 2003) and report scores in the appendix A.2.", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "B Extended Description of V-JEPA\nTable 8 pretraining hyper-parameters for V-JEPA.\nlr, ViT-L/16 224 = 6.25e-4. lr, ViT-H/16 224 = 6.25 × 10 - 4. lr, ViT-H/16 384 = 6.25 × 10 - 4. start_lr, ViT-L/16 224 = 2 × 10 - 4. start_lr, ViT-H/16 224 = 2 × 10 - 4. start_lr, ViT-H/16 384 = 2 × 10 - 4. final_lr, ViT-L/16 224 = 1 × 10 - 6. final_lr, ViT-H/16 224 = 1 × 10 - 6. final_lr, ViT-H/16 384 = 1 × 10 - 6. start_momentum, ViT-L/16 224 = 0.998. start_momentum, ViT-H/16 224 = 0.998. start_momentum, ViT-H/16 384 = 0.998. final_momentum, ViT-L/16 224 = 1.0. final_momentum, ViT-H/16 224 = 1.0. final_momentum, ViT-H/16 384 = 1.0. start_weight_decay, ViT-L/16 224 = 0.04. start_weight_decay, ViT-H/16 224 = 0.04. start_weight_decay, ViT-H/16 384 = 0.04. final_weight_decay, ViT-L/16 224 = 0.4. final_weight_decay, ViT-H/16 224 = 0.4. final_weight_decay, ViT-H/16 384 = 0.4. scheduler_scale_factor, ViT-L/16 224 = 1.25. scheduler_scale_factor, ViT-H/16 224 = 1.25. scheduler_scale_factor, ViT-H/16 384 = 1.25. architecture, ViT-L/16 224 = . architecture, ViT-H/16 224 = . architecture, ViT-H/16 384 = . patch_size, ViT-L/16 224 = 16.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv3.pdf" - }, - { - "text": "A.2 Created datasets\nSyntec Figure 5 shows an extract from the Syntec dataset with a document and a query relative to this document.\nHAL Figure 6 is an extract from the HAL dataset. Table 4 lists the distribution of classes ( domain field) for the HAL dataset on raw subset and mteb_eval subset, which is used for MTEB evaluation. Labels descriptions can be found at this URL: https://api.archivesouvertes.fr/ref/domain/?q=*:*&rows=393 or in Table 4. After pre-processing, mteb_eval covers titles from 10 domains as classes with less than 500 samples were removed. In the MTEB evaluation subset of the dataset, titles composed of 2 words or less have been removed (371 samples), resulting in an average word count of 13 . 4 . Figure 7 shows the word count distribution per title. Furthermore, the dataset has been cleaned up by manually removing all non-French titles. Additionally, it can be observed in Table 4 that in the original raw dataset, the shs and sdv classes represent by far the majority of the dataset samples with respectively 58706 samples (73%) and 11049 samples (13%). In order to\n12\nmitigate the class imbalance while preserving the majority of those classes, they have been randomly subsampled to 6701 and 4803 samples. Furthermore, baseline models have been trained and tested to assess the usability of this dataset in other tasks, such as classification and topic modeling. Table 5 shows the results obtained.\nSummEvalFr Extracts of humans and machine summaries translated in French from SummEvalFr and the original ones in English from SummEval (Fabbri et al., 2021) are shown in Figure 9. As explained in section 3.1.3, we use a LLM to evaluate the quality of translations for human summaries, we provide the prompt used with GPT-4 for this evaluation in Figure 8.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "3.4 Pretraining Data and Evaluation Setup\nViT-H/16, Avg. = 72.0. ViT-H/16, Data = VideoMix2M. ViT-H/16, #Samples = 2000K. ViT-H/16, Frozen Evaluation.K400 (16 × 1 × 1) = 74.0. ViT-H/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 68.5. ViT-H/16, Frozen Evaluation.IN1K = 75.9. ViT-H/16, Avg. = 72.8\nEvaluations. Pretrained models are evaluated on downstream video and image tasks. On video tasks, we use a subset of the VideoGLUE benchmark (Yuan et al., 2023) to test for various capabilities; specifically, we investigate action recognition on Kinetics400 (K400) (Kay et al., 2017), motion classification on Something-Something-v2 (SSv2) (Goyal et al., 2017), and action localization on AVA (Gu et al., 2018). Action classification on Kinetics evaluates the appearance-based understanding of the model, as many action classes in the dataset can be inferred from the presence of specific objects in the video (Sevilla-Lara et al., 2021). Motion classification on Something-Something-v2 evaluates the temporal understanding of the model, as action classes in the dataset are decoupled from the appearance/presence of specific objects in the video (Goyal et al., 2017). Finally, action localization on AVA evaluates the ability of the model to understand and localize motions in the video. We follow standard practice and report accuracy on K400 and SSv2 by sampling several spatial and temporal views. For static image tasks, we explore object recognition on ImageNet (Russakovsky et al., 2015), scene classification on Places205 (Zhou et al., 2014), and fine-grained recognition on iNaturalist 2021 (Van Horn et al., 2018).", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "B Extended Description of V-JEPA\nTable 8 pretraining hyper-parameters for V-JEPA.\ndata, ViT-L/16 224 = . data, ViT-H/16 224 = . data, ViT-H/16 384 = . datasets, ViT-L/16 224 = . datasets, ViT-H/16 224 = VideoMix2M VideoMix2M VideoMix2M. datasets, ViT-H/16 384 = . resolution, ViT-L/16 224 = 224. resolution, ViT-H/16 224 = 224. resolution, ViT-H/16 384 = 384. num_frames, ViT-L/16 224 = 16. num_frames, ViT-H/16 224 = 16. num_frames, ViT-H/16 384 = 16. temporal_stride, ViT-L/16 224 = 4. temporal_stride, ViT-H/16 224 = 4. temporal_stride, ViT-H/16 384 = 4. horizontal_flip, ViT-L/16 224 = true. horizontal_flip, ViT-H/16 224 = true. horizontal_flip, ViT-H/16 384 = true. random_resize_scale, ViT-L/16 224 = (0.3, 1.0). random_resize_scale, ViT-H/16 224 = (0.3, 1.0). random_resize_scale, ViT-H/16 384 = (0.3, 1.0). random_resize_aspect_ratio, ViT-L/16 224 = (0.75, 1.35). random_resize_aspect_ratio, ViT-H/16 224 = (0.75, 1.35). random_resize_aspect_ratio, ViT-H/16 384 = (0.75, 1.35). masking, ViT-L/16 224 = . masking, ViT-H/16 224 = . masking, ViT-H/16 384 = . block_aspect_ratio, ViT-L/16 224 = (0.75, 1.5). block_aspect_ratio, ViT-H/16", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv3.pdf" - }, - { - "text": "3.4 Pretraining Data and Evaluation Setup\nTable 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All models are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We examine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single center view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide a consistent improvement over pixel space prediction.\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate downstream performance of the frozen backbones with an attentive probe using a single center view. Average performance across tasks increases with the pretraining dataset size.\nPixels, Arch. = ViT-L/16. Pixels, Frozen Evaluation.K400 (16 × 1 × 1) = 68.6. Pixels, Frozen Evaluation.SSv2 (16 × 1 × 1) = 66.0. Pixels, Frozen Evaluation.IN1K = 73.3. Pixels, Fine-Tuning.K400-ft (16 × 5 × 3) = 85.4. Features, Arch. = ViT-L/16. Features, Frozen Evaluation.K400 (16 × 1 × 1) = 73.7. Features, Frozen Evaluation.SSv2 (16 × 1 �� 1) = 66.2. Features, Frozen Evaluation.IN1K = 74.8. Features, Fine-Tuning.K400-ft (16 × 5 × 3) = 85.6", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "What is appropriate authority ?", - "target_page": 1, - "target_passage": "APPROPRIATE AUTHORITY.—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "II.13.3. Exclusive rights\nThe contractor warrants that the exclusive rights and the modes of exploitation may be exercised by the contracting authority on all parts of the results , be it via a transfer of ownership of the rights, on those parts which were specifically created by the contractor, or via a licence of the pre-existing rights, on those parts consisting of pre-existing materials .\nWhere pre-existing materials are inserted in the results , the contracting authority may accept reasonable restrictions impacting on the above list, provided that the said materials are easily identifiable and separable from the rest, that they do not correspond to substantial elements of the results , and that, should the need arise, satisfactory replacement solutions exist, at no additional costs to the contracting authority. In such case, the contractor will have to clearly inform the contracting authority before making such choice and the contracting authority has the right to refuse it.", - "page_start": 24, - "page_end": 24, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.13.10. Visibility of ECHA funding and disclaimer\nWhen making use of the results , the contractor must declare that they have been produced under a contract with the contracting authority and that the opinions expressed are those of the contractor only and do not represent the contracting authority's official position. The contracting authority may waive this obligation in writing or provide the text of the disclaimer.", - "page_start": 26, - "page_end": 26, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.12. Assignment\nII.12.1 The contractor must not assign any of the rights and obligations arising from the FWC, including claims for payments or factoring, without prior written authorisation from the contracting authority. In such cases, the contractor must provide the contracting authority with the identity of the intended assignee.\nII.12.2 Any right or obligation assigned by the contractor without authorisation is not enforceable against the contracting authority.", - "page_start": 22, - "page_end": 22, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.21.7. Suspension of the time allowed for payment\nThe contracting authority may suspend the payment periods specified in Article I.6 at any time by notifying the contractor (or leader in the case of a joint tender) that its invoice cannot be processed. The reasons the contracting authority may cite for not being able to process an invoice are:\n(a) because it does not comply with the FWC;\n(b) because the contractor has not produced the appropriate documents or deliverables; or\n(c) because the contracting authority has observations on the documents or deliverables submitted with the invoice.\nThe contracting authority must notify the contractor (or leader in the case of joint tender) as soon as possible of any such suspension, giving the reasons for it. In cases b) and c) referred above, the contracting authority shall notify the contractor (or leader in case of a joint tender) the time limits to submit additional information or corrections or a new version of the documents or deliverables if the contracting authority requires it.\nSuspension takes effect on the date the contracting authority sends the notification . The remaining payment period resumes from the date on which the requested information or revised documents are received or the necessary further verification, including on-the-spot checks, is carried out. Where the suspension period exceeds two months, the contractor (or leader in the case of a joint tender) may request the contracting authority to justify the continued suspension.\nWhere the payment periods have been suspended following rejection of a document referred to in the first paragraph of this Article and the new document produced is also rejected, the contracting authority reserves the right to terminate the specific contract in accordance with Article II.18.1(c) .", - "page_start": 34, - "page_end": 34, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "II.4. Provision of services\nII.4.4 The contractor must obtain any permit or licence required in the State where the services are to be provided.\nII.4.5 All periods specified in the FWC are calculated in calendar days, unless otherwise specified.\nII.4.6 The contractor must not present itself as a representative of the contracting authority and must inform third parties that it is not part of the European public service.\nII.4.7 The contractor is responsible for the personnel who carry out the services and exercises its authority over its personnel without interference by the contracting authority. The contractor must inform its personnel that:\n(a) they may not accept any direct instructions from the contracting authority; and\n(b) their participation in providing the services does not result in any employment or contractual relationship with the contracting authority.\nII.4.8 The contractor must ensure that the personnel implementing the FWC and any future replacement personnel possess the professional qualifications and experience required to provide the services, as the case may be on the basis of the selection criteria set out in the tender specifications.\nII.4.9 At the contracting authority's reasoned request, the contractor must replace any member of personnel who:\n(a) does not have the expertise required to provide the services; or\n(b) has caused disruption at the premises of the contracting authority.\nThe contractor bears the cost of replacing its personnel and is responsible for any delay in providing the services resulting from the replacement of personnel .\nII.4.10 The contractor must record and report to the contracting authority any problem that affects its ability to provide the services. The report must describe the problem, state when it started and what action the contractor is taking to resolve it.", - "page_start": 15, - "page_end": 15, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "3.2 User and group administration\nWhen you design a Content Manager OnDemand system, you must determine the best way to implement the many authority structures that are available for users and administrators of your system. The span of control for the administration of the system must be considered with the level of user access to the data that is stored in the system. How many different administrators are required? Will all administrators have system administrator authority or will different administrators have different levels of authority? What is the most effective way to restrict a user's access to only the data that is necessary to do that user's job?\nThe answers to these questions depend on the size of the system, the degree of centralization to be exercised over system administration, and the nature of the data and the business needs of the users.", - "page_start": 89, - "page_end": 89, - "source_file": "sg246915.pdf" - }, - { - "text": "Centralized or decentralized\nIn a system design that exercises centralized control, one or a few administrators are granted system administrator authority. A centralized system typically is used when the number of reports and users to be added to the system is small. Centralized administration is also appropriate where resources are limited and only one person might have the skills and knowledge to perform the system administration tasks, or where one user group performs all of the administration tasks.\nIn a system design with decentralized control, different users are granted different levels of administrative authority. For example, you might have users that have the authority to create users and groups. Other users might have the authority to create application groups and folders, and others might be given full system administration authority.\nThe skill level of the users might be a determining factor in the degree of authority that is granted. It takes a more skilled user to define indexes and report parameters than to set up users and groups. A decentralized system is typically used when data from different sources is stored on the same Content Manager OnDemand system but must be maintained independently of other data. Decentralization also makes sense when report loading and processing needs are limited to a specific group of users for security purposes or when administrators that add users and groups must be prevented from accessing report data.\nThe decision about whether to use a centralized or a decentralized administration model is best made before any data is set up in the system. Even though the type of administration that is chosen can be changed later, the amount of work that is involved in that change is greater than the amount of work that is necessary to study the requirements of the system and implement the appropriate administration policies from the beginning.\nIn this section, we describe different types of users, followed by a description of a decentralized administrative plan. We also introduce a new administrative tool, Content Manager OnDemand XML Batch Administration, which is a command-line program that is run on the Content Manager OnDemand server.", - "page_start": 89, - "page_end": 90, - "source_file": "sg246915.pdf" - }, - { - "text": "' Circumstances in which it is not necessary to review an EHC plan\n18A. -(1) It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as soon as reasonably practicable.'.\n12. In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert-\n'(6) The local authority need not comply with the time limit referred to in paragraphs (3) and (4) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n13. In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n14. In regulation 45 (unopposed appeals), after paragraph (7) insert-\n'(8) The local authority need not comply with the time limits specified in paragraph (3A) if it is impractical to do so because the circumstances referred to in regulation 10(4)(e) apply.'.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "2. Significant Accounting Policies (continued)\nIn its evaluation, management considers whether Killam controls the entity by virtue of the following circumstances:\na) Power over more than half of the voting rights by virtue of an agreement with other investors;\nb) Power to govern the financial and operating policies of the entity under a statute or an agreement;\nc) Power to appoint or remove the majority of the members of the board of directors or equivalent governing body and control of the entity is by that board or body;\nd) Power to cast the majority of votes at meetings of the board of directors or equivalent governing body and control of the entity is by that board or body.\nA change in the ownership interest of a subsidiary, without a change of control, is accounted for as an equity transaction. Losses are attributed to the non-controlling interest even if that results in a deficit balance.", - "page_start": 70, - "page_end": 70, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "3.2.1 User types, authorities, and functions\nFour types of users are available in a Content Manager OnDemand system. Each type has a different level of access, authority, and responsibility in the system:\n/SM590000 User: Logs in and queries the system to retrieve documents and reports for viewing.\n/SM590000 User administrator: Adds users or other user administrators to the system.\n/SM590000 Report administrator: Defines the application groups, applications, folders, and cabinets to be part of the system. The report administrator is responsible for understanding the report and document data and for defining the indexes to be extracted from the data and stored. A report administrator is also responsible for designing the user interface to the reports through the folder definition process and for controlling access authority to the reports that the report administrator designs, indexes, and loads.\n/SM590000 System administrator: Has the highest level of authority in a Content Manager OnDemand system. The system administrator has authority for all system functions and can grant other users the authority to perform various tasks. The system administrator is the only level of authority that can create storage sets and define system printers.\nWhen the administrative tasks and levels of authorities are understood, you must decide the span of control in the system. Is it better to have one user control all access and functions in the Content Manager OnDemand system, or is it better to spread the administrative tasks among several users to smooth the workload based on system requirements? The answer to this question depends on whether your environment uses centralized or decentralized administrative control.\nA centralized administrative plan is best suited for a Content Manager OnDemand system with a few users and relatively few reports to define. In the next section, we focus on the decentralized system and describe the different aspects of a decentralized administrative plan.\nChapter 3. Administration\n67", - "page_start": 90, - "page_end": 90, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "What criteria must a lactation room meet?", - "target_page": 1, - "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.-Chapter 33 of title 40, United States Code, is amended by adding at the end the following new section:", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "''§ 3318. Lactation room in public buildings\n''(a) DEFINITIONS.-In this section:\n''(1) APPROPRIATE AUTHORITY.-The term 'appropriate authority' means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building.\n''(2) COVERED PUBLIC BUILDING.-The term 'covered public building' means a public building (as defined in section 3301) that is open to the public and contains a public restroom, and includes a building listed in section 6301 or 5101.\n''(3) LACTATION ROOM.-The term 'lactation room' means a hygienic place, other than a bathroom, that-\n''(A) is shielded from view;\n''(B) is free from intrusion; and\n''(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet.\n''(b) LACTATION ROOM REQUIRED.-Except as provided in subsection (c), the appropriate authority of a covered public building shall ensure that the building contains a lactation room that is made available for use by members of the public to express breast milk.\n''(c) EXCEPTIONS.-A covered public building may be excluded from the requirement in subsection (b) at the discretion of the appropriate authority if-\n''(1) the public building-\n''(A) does not contain a lactation room for employees who work in the building; and\n''(B) does not have a room that could be repurposed as a lactation room or a space that could be made private using portable materials, at a reasonable cost; or\nJuly 25, 2019\n[H.R. 866]\nFairness For Breastfeeding Mothers Act of 2019. 40 USC 101 note.\n40 USC 3318.\ndkrause on DSKBC28HB2PROD with PUBLAWS\nVerDate Sep 11 2014\n15:46 Aug 08, 2019\nJkt 089139\nPO 00030\nFrm 00002\nFmt 6580\nSfmt 6580\nE:\\PUBLAW\\PUBL030.116\nPUBL030\nPUBLIC LAW 116-30-JULY 25, 2019\n133 STAT. 1033\n''(2) new construction would be required to create a lactation room in the public building and the cost of such construction is unfeasible.", - "page_start": 0, - "page_end": 1, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "An Act\nTo provide a lactation room in public buildings.\nBe it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "Review of need for requirements\n24. The Secretary of State must review the need for the requirements imposed by these Regulations by 14th June 2021 and at least once every 28 days thereafter.", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Circumstances in which it is not necessary to review an EHC plan\n18A. -(1) It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as soon as reasonably practicable.'.\n12. In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert-\n'(6) The local authority need not comply with the time limit referred to in paragraphs (3) and (4) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n13. In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n14. In regulation 45 (unopposed appeals), after paragraph (7) insert-\n'(8) The local authority need not comply with the time limits specified in paragraph (3A) if it is impractical to do so because the circumstances referred to in regulation 10(4)(e) apply.'.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n(d) regulation 19 (requirement to consider mediation);\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to pursue mediation);\n(f) regulation 21 (mediation);\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n(h) regulation 27(3) (steps to be taken by a home authority);\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n(j) regulation 30(3) and (6) (unopposed appeals).'.\n21. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n22. In regulation 5(4) (decision whether or not to conduct a detained person's EHC needs assessment)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n', or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n( a ) S.I. 2015/62.\n4", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n6. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n7. In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n8. In regulation 8(2) (duty to co-operate in EHC needs assessments)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n9. In regulation 10(4) (decision not to secure an EHC plan)-\n2\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n10. In regulation 13(3) (timescales for EHC plans), for '(d)' substitute '(e)'.\n11. After regulation 18 (circumstances in which a local authority must review an EHC plan) insert-", - "page_start": 1, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n23. In regulation 8(2) (duty to co-operate in a detained person's EHC needs assessment), at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n24. In regulation 10(4) (decision not to secure an EHC plan)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n25. In regulation 13(3) (timescales for EHC plans), for '(c)' substitute '(d)'.\n26. In regulation 29 (compliance with the orders of the First-tier Tribunal)-\n(a) after paragraph (6) insert-\n'(6A) The home authority need not comply with the time limits specified in paragraph (3) if it is impractical to do so because the circumstances referred to in regulation 10(4)(d) apply.'.\n(b) in paragraph (7)(c) after '10(4)(a)' insert 'or (d)'.\n27. In regulation 30(7)(c) (unopposed appeals), after '10(4)(a)' insert 'or (d)'.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Further requirements on arrivals from category 2 countries and territories\n(iv) in the goods vehicle or a hotel, hostel or bed and breakfast accommodation while not undertaking the work described in that paragraph if P is travelling with another person in a goods vehicle with a sleeper cab.\n(4) The address specified by P in the Passenger Locator Form pursuant to paragraph 2(a) of Schedule 6 must be-\n(a) their home;\n(b) the home of a friend or family member;\n(c) a hotel, hostel, bed and breakfast accommodation, holiday apartment or home, campsite, caravan park or boarding house, canal boat or any other vessel;\n(d) a military site or establishment;\n(e) accommodation facilitated by the Secretary of State for the purposes of P's self-isolation;\n(f) where P is an asylum seeker, accommodation provided or arranged under section 4, 95 or 98 of the Immigration and Asylum Act 1999; or\n(g) where P is a person described in paragraph 9(1) of Schedule 10 to the Immigration Act 2016 (powers of Secretary of State to enable person to meet bail conditions), accommodation provided or arranged under that paragraph.\n(5) More than one address may be specified as the place at which P intends to self-isolate in the Passenger Locator Form where-\n(a) a legal obligation requires P to change addresses; or\n(b) it is necessary for P to stay overnight at an address on their arrival in England before travelling directly to another address at which they will be self-isolating.\n(6) In paragraph (3)(a)(ii) 'a place at which they intend to self-isolate while in England' means-\n(a) where the person has completed a Passenger Locator Form, at an intended place of selfisolation specified in that form;\n(b) where the person has completed a form equivalent to a Passenger Locator Form pursuant to an enactment in Scotland, Wales or Northern Ireland, at an intended place of selfisolation specified in that form;\n(c) in any other case at a place described in paragraph (4)(a) to (c).\n(7) P must, on their arrival in England, travel directly to the place at which they are to selfisolate, and must then self-isolate until whichever is the earlier of-", - "page_start": 13, - "page_end": 13, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Meaning of 'place'\n14. For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room in the designated accommodation where P is staying and, if connected to the room where P is staying, the room of any person referred to in paragraph 11(a) (travelling companion), including any balcony, and does not include the communal areas or any garden, yard, passage, stair, garage, outhouse or appurtenance of the accommodation in which the place is situated.", - "page_start": 77, - "page_end": 77, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "When take effect the Fairness For Breastfeeding Mothers Act ?", - "target_page": 2, - "target_passage": "The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SECTION 1. SHORT TITLE.\nThis Act may be cited as the ''Fairness For Breastfeeding Mothers Act of 2019''.", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "Career development handbook for young mothers\nSMBC has compiled a career development handbook covering maternity leave for all women employees wishing to strike a better balance between work and family life. It provides pathways for mothers pursuing careers, citing answers by women who have been through this experience to questions such as 'What do I need to do to return to work?' and 'How do I go about arranging nursery school?' It also includes preparatory exercises for expectant mothers and support lectures on child-raising leave after they return to the workplace.\n21\nCSR REPORT 2011\nCSR REPORT 2011\n22\nSumitomo Mitsui Financial Group CSR Report", - "page_start": 10, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Consumer Laws and Regulations\nWe are also subject to certain consumer laws and regulations that are designed to protect consumers in transactions with banks. While the following list is not exhaustive, these laws and regulations include the Truth in Lending Act, the Truth in Savings Act, the Electronic Funds Transfer Act, the Expedited Funds Availability Act, the Equal Credit Opportunity Act, and the Fair Housing Act, among others. These laws and regulations among other things prohibit discrimination on the basis of race, gender or other designated characteristics and mandate various disclosure requirements and regulate the manner in which financial institutions must deal with customers when taking deposits or making loans to such customers. These and other laws also limit finance charges or other fees or charges earned in our activities. We must comply with the applicable provisions of these consumer protection laws and regulations as part of our ongoing customer relations.", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "G overnment Announcement Regarding Roaming Rates and Enforcement\nIn December, the federal government announced that it would introduce legislation in 2014. Firstly, it would enact a legislation that would cap wholesale domestic roaming rates at a rate no higher than the rates the carrier charges its own retail customers. Secondly, the government would amend the Radio-communications Act and the Telecommunications Act to permit Industry Canada and the CRTC to impose monetary penalties in order to enforce telecommunications regulations. Details of the announced legislation have not yet been released.", - "page_start": 72, - "page_end": 72, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "An Act\nTo provide a lactation room in public buildings.\nBe it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "Neuroanatomical changes observed over the course of a human pregnancy\nWorldwide, nearly 85% of women experience one or more pregnancies in their lifetime 1 , with 140 million women becoming pregnant each year. Over an approximately 40-week gestational window, the maternal body undergoes profound physiological adaptations to support the development of the fetus, including increases in plasma volume, metabolic rate, oxygen consumption and immune regulation 2 . These rapid adaptations are initiated by 100-fold to 1,000-fold increases in hormone production, including estrogen and progesterone. These neuromodulatory hormones also drive significant reorganization of the central nervous system. Evidence from animal models and human studies converge on pregnancy as a period of remarkable neuroplasticity 3-10 (see ref. 10 for one of the earliest known observations). Gestational increases in steroid hormone synthesis drive neurogenesis, dendritic spine growth, microglial proliferation, myelination and astrocyte remodeling (for review, see ref. 11). These cellular changes are pronounced in brain circuits that promote maternal behavior. For example, Ammari et al. recently discovered that steroid hormones can fine-tune the response properties of galanin neurons in the rodent medial preoptic area of the hypothalamus (mPOA), leading to enhanced sensitivity in dams to sensory cues from newborn pups 12 .\nIn humans, reductions in gray matter volume (GMV) have been observed postpartum 13-16 , particularly in regions central to theory-of-mind processing 13 . These GMV changes persist at 6 years postpartum 17 and are traceable decades later 18,19 , underscoring the permanence of this major remodeling event. And yet the changes that occur within the maternal brain during gestation itself are virtually unknown (see ref. 20 for early neuroimaging insight). A recent study by Paternina-Die et al. offers intriguing clues 21 . Women were scanned once in the third trimester and again in the postpartum period, revealing a reduction of cortical volume observable in the late pregnancy scan. These findings suggest that pregnancy is a highly dynamic period for neural remodeling, yet neuroscientists lack a detailed map of how the human brain changes throughout the gestational period.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed4.pdf" - }, - { - "text": "We are subject to certain laws, litigation, regulatory matters and ethical standards, and our failure to comply with or adequately address developments as they arise could adversely affect our reputation and operations.\nOur policies, procedures and practices and the technology we implement are designed to comply with federal, state, local and foreign laws, rules and regulations, including those imposed by the SEC and other regulatory agencies, the marketplace, the banking industry and foreign countries, as well as responsible business, social and environmental practices, all of which may change from time to time. Significant legislative changes, including those that relate to employment matters and health care reform, could impact our relationship with our workforce, which could increase our expenses and adversely affect our operations. In addition, if we fail to comply with applicable laws and regulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our reputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements of our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result in the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of operations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may increase our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in various litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our business and financial condition.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nAlthough studied to a lesser degree, ties between maternal behavior and white matter microstructure (particularly connectivity between temporal and occipital lobes) have been noted 31 . Here we reveal pronounced GMV changes in regions within sensory, attention and default mode networks over the gestational window. In parallel, we observed increased anisotropy in white matter tracts that facilitate communication between emotional and visual processing hubs 37-39 , including the inferior longitudinal fasciculus and inferior fronto-occipital fasciculus. Pinpointing the synchrony of gray and white matter changes that unfold in the maternal brain could be key to understanding the behavioral adaptions that emerge during and after pregnancy, such as honing the brain's visual and auditory responses to infant cues and eliciting maternal behavior. Research into other major transition periods supports this idea. For instance, adolescence is a dynamic period characterized by region-specific, nonlinear decreases in GMV and increases in WMV, maturational brain changes that are tied to gains in executive function and social cognition 40 . For both adolescence 41 and matrescence, the considerable rise in steroid hormone production appears to remodel the brain (see ref. 25 for comparative analysis), promoting a suite of behaviors adaptive to that life stage. How specific neural changes give rise to specific behavioral adaptations has yet to be fully explored with respect to human pregnancy.\nThis precision imaging study mapped neuroanatomical changes across pregnancy in a single individual, precluding our ability to generalize to the broader population. To benchmark our findings, we compared the magnitude of GMV changes observed throughout pregnancy against data from nonpregnant individuals sampled over a similar time course. Doing so provided compelling evidence that pregnancy-related neuroanatomical shifts far exceed normative day-to-day brain variability and measurement error. Evidence suggests that white matter microstructure remains fairly stable over a six-month period 42 , but more studies are needed to compare the degree of white matter changes observed during pregnancy to normative change over time. Further, sampling larger cohorts of women will generate much-needed normative models of brain change (akin to ref. 43) throughout pregnancy to establish what constitutes a typical degree of neuroanatomical change expected during gestation and postpartum recovery.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nsleep patterns 11 . These factors could have a role in the brain changes observed here, with some driving neurobiological changes and others, like water retention, potentially affecting MRI-based measurements. Note that, although cortical reductions in GMV over gestation were stable across analyses, accounting for QC measures influenced the magnitude and location of these results. These metrics all fell within the standard range, but there may be meaningful reductions in signal that accompany volumetric reductions (for example, increased CSF and decreased GM)-a methodological nuance that goes beyond the scope of this resource study. Ultimately, identifying the shared and unique contributions of these factors to the neuroanatomical changes that unfold across gestation warrants further investigation. Deeply phenotyping a large and diverse cohort of women across pregnancy will open up new avenues of exploration, for example, allowing researchers to link blood-based proteomic signatures to pregnancy outcomes; deploying wearable devices to monitor changes in sleep, cognition and mood; and probing the broader social and environmental determinants of maternal health 27 .\nThe neuroanatomical changes that unfold during matrescence may have broad implications for understanding individual differences in parental behavior 13,24,30,31 , vulnerability to mental health disorders 32,33 and patterns of brain aging 18,19,34-36 . Decreases in GMV may reflect 'fine-tuning' of the brain by neuromodulatory hormones in preparation for parenthood 26 . For example, in rodents, steroid hormones promote parental behavior by remodeling specific neural circuits in the medial preoptic area of the hypothalamus. These behavioral adaptations are critical to the dam's ability to meet the demands of caring for\nResource\nthe offspring 12 . Human studies have revealed GMV reductions in areas of the brain important for social cognition and the magnitude of these changes corresponds with increased parental attachment 13 . Deeper examination of cellular and systems-level mechanisms will improve our understanding of how pregnancy remodels specific circuits to promote maternal behavior.", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "Postretirement Health Care\nThe Company invests these funds in high grade money market instruments. Prior to 2003 the plan was not funded. The discount rates at fiscal year-end 2003, 2002, and 2001 were 6.0%, 6.5%, and 6.5%, respectively. The Company payment for these benefits has reached the maximum amounts per the plan; therefore, healthcare trend rates have no impact on company cost.\nIn December 2003, the United States enacted into law the Medicare Prescription Drug, Improvement and Modernization Act of 2003 (the 'Act'). The Act established a prescription drug benefit under Medicare, known as 'Medicare Part D,' and a federal subsidy to sponsors of retiree health care benefit plans that provide a benefit that is at least actuarially equivalent to Medicare Part D.\nIn January 2004, the FASB issued FASB Staff Position No. 106-1, 'Accounting and Disclosure Requirements Related to the Medicare Prescription Drug, Improvement and Modernization Act of 2003' ('FSP 106-1'). The Company has elected to defer accounting for the economic effects of the Act, as permitted by FSP 106-1. Therefore, in accordance with FSP 106-1, the accumulated postretirement benefit obligation or net period postretirement benefit cost included in the consolidated financial statements and disclosed above do not reflect the effects of the Act. Specific authoritative guidance on accounting for the federal subsidy is pending. The final issued guidance could require a change to previously reported information.", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "When is it not necessary to review an EHC plan ?", - "target_page": 3, - "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "' Circumstances in which it is not necessary to review an EHC plan\n18A. -(1) It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as soon as reasonably practicable.'.\n12. In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert-\n'(6) The local authority need not comply with the time limit referred to in paragraphs (3) and (4) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n13. In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n14. In regulation 45 (unopposed appeals), after paragraph (7) insert-\n'(8) The local authority need not comply with the time limits specified in paragraph (3A) if it is impractical to do so because the circumstances referred to in regulation 10(4)(e) apply.'.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n6. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n7. In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n8. In regulation 8(2) (duty to co-operate in EHC needs assessments)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n9. In regulation 10(4) (decision not to secure an EHC plan)-\n2\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n10. In regulation 13(3) (timescales for EHC plans), for '(d)' substitute '(e)'.\n11. After regulation 18 (circumstances in which a local authority must review an EHC plan) insert-", - "page_start": 1, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 working days), (4), (5), (7) (in relation to the second reference to 15 working days) and (8);\n(b) regulation 16(2) and (3) (change of responsible commissioning body);\n(c) regulation 20(9) and (10) (review where the child or young person attends a school or other institution);\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person does not attend a school or other institution);\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess educational, health care and social care provision);\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment);\n(g) regulation 33 (requirement to consider mediation);\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails to pursue mediation);\n(i) regulation 35(2), (3) and (4) (mediation - health care issues);\n(j) regulation 36(2) (mediation - no health care issues);\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5));\n(l) regulation 42(3) and (4) (steps to be taken by a local authority);\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier Tribunal);\n(n) regulation 45(4), (5) and (6A) (unopposed appeals);\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and\n(p) regulation 56(3) (publication of comments on the local offer).'.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "CRTC Review of Wholesale Telecommunications S ervices\nIn October 2013, the CRTC initiated its planned review of the telecommunications essential services rulings it released in March 2008. The review will culminate with a public hearing expected in November 2014.", - "page_start": 73, - "page_end": 73, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n23. In regulation 8(2) (duty to co-operate in a detained person's EHC needs assessment), at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n24. In regulation 10(4) (decision not to secure an EHC plan)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n25. In regulation 13(3) (timescales for EHC plans), for '(c)' substitute '(d)'.\n26. In regulation 29 (compliance with the orders of the First-tier Tribunal)-\n(a) after paragraph (6) insert-\n'(6A) The home authority need not comply with the time limits specified in paragraph (3) if it is impractical to do so because the circumstances referred to in regulation 10(4)(d) apply.'.\n(b) in paragraph (7)(c) after '10(4)(a)' insert 'or (d)'.\n27. In regulation 30(7)(c) (unopposed appeals), after '10(4)(a)' insert 'or (d)'.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "3.1. A new governance framework\nIn the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework . This will help map obligations and commitments and set out a roadmap to guide their implementation.\nAs part of this new framework, the Commission will put in place a monitoring and review mechanism. This will include a clear set of agreed indicators and will enable regular progress assessment and set out corrective action if necessary. This mechanism will feed the Environmental Implementation Review and contribute to the European Semester.\nThe new governance framework will ensure co-responsibility and co-ownership by all relevant actors in meeting the EU's biodiversity commitments. It will support administrative capacity building, transparency, stakeholder dialogue, and participatory governance at different levels.\nThe Commission will assess the progress and suitability of this approach in 2023, and consider whether a legally binding approach to governance is needed.", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "5. CONCLUSION\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 th Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n83 https://www.who.int/features/qa/one-health/en/\n22", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Review and expiry\n2. -(1) The Secretary of State must review the effectiveness of these Regulations during the period for which they have effect.\n(2) These Regulations cease to have effect on 25th September 2020.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Review of need for requirements\n24. The Secretary of State must review the need for the requirements imposed by these Regulations by 14th June 2021 and at least once every 28 days thereafter.", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n(d) regulation 19 (requirement to consider mediation);\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to pursue mediation);\n(f) regulation 21 (mediation);\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n(h) regulation 27(3) (steps to be taken by a home authority);\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n(j) regulation 30(3) and (6) (unopposed appeals).'.\n21. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n22. In regulation 5(4) (decision whether or not to conduct a detained person's EHC needs assessment)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n', or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n( a ) S.I. 2015/62.\n4", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "Give me some info about the scroll bars in excel", - "target_page": 6, - "target_passage": "Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "NAVIGATING IN A FILE\nArrow Keys\nMove one cell to the right, left, up or down\nTab\nMove once cell to the right\nCtrl+Home\nTo beginning file\nCtrl+End\nTo end of typed information\nHome\nBeginning of a line\nEnd\nEnd of a line\nPage Down\nDown one screen\nPage Up\nUp one screen\nF5\nTo a specific page\nScroll bars\nAppear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document.\nITTraining@sgul.ac.uk\nPage 2\nSt. George's Information Services", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nO pe n Fi le Before starting this exercise you MUST open the file E1355 Quick Analysis_5.xlsx…\n Click in any cell containing data\n Hold down + , then press to select all of the non-empty cells around the current cell\n Using the scroll bars, scroll to the bottom right corner of the selection, click on the Quick Analysis button, then click on the TABLES tab\n Click on Table to turn the selected range into a table\n Scroll across and on the drop arrow for Position to see sorting and filtering options\n Click on Select All to remove the tick, then click on Effective People Leader so it appears ticked\n Click on [OK] to see only those people with this position title", - "page_start": 40, - "page_end": 40, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "UNDERSTANDING WORKBOOKS\nIn Microsoft Excel the data you enter, whether it consists of numbers, text, or formulas, is stored in a file known as a workbook . Workbooks are just like huge electronic books with pages (or\nsheets ) that have been ruled into columns and rows. Before using Excel it is helpful to know what the various parts and elements that make up a workbook are.\n A worksheet (or page) in a workbook contains 16,384 columns that are labelled using letters of the alphabet. The first column in a worksheet is labelled column A , while the last is labelled XFD\n A worksheet (or page) in a workbook contains 1,048,576 rows that are labelled using numbers from 1 to 1,048,576\n Where a column and row intersect we get what is known as a cell . You enter your data into these cells. Each cell in a worksheet can hold up to 32,767 characters - although it would be unrealistic to ever push it this far. Cells are referred to by their column and row labels. For example, in the screen above the cell we are pointing to is C11 - this reference is known as the cell address and is most important as it is frequently used in commands and formulas\n When you start typing something, you want it to appear somewhere in the worksheet. As a consequence when the Status Bar shows Ready mode, at least one cell in the worksheet will be highlighted - this is known as the active cell . In the screen above, the active cell is cell A1 -notice that the column label and the row label also appears coloured to indicate the active cell. You can have more than one active cell - when this occurs you have what is known as a range\n A workbook (as you would expect) is made up of pages known as worksheets . You can have as many sheets in a workbook as your computer resources can accommodate. As a default, a new blank workbook normally has 3 worksheets labelled Sheet1 , Sheet2 , and Sheet3 . Of course these labels are pretty boring and meaningless and can be changed to something more relevant\n The Insert Worksheet button here will insert another worksheet into the current workbook should you need it\nITTraining@sgul.ac.uk\nPage 1\nSt. George's Information Services\nMicrosoft Excel\nMicrosoft Excel", - "page_start": 4, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Excel Fundamentals\nMicrosoft Excel", - "page_start": 1, - "page_end": 1, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Excel\nExcel PDF Accessibility\nExcel.Workbook.ExportAsFixedFormat", - "page_start": 0, - "page_end": 0, - "source_file": "office-pdf.pdf" - }, - { - "text": "FREEZING ROWS AND COLUMNS\nWhen you lay out your data in rows and columns, it is most likely that your headings end up at the top or to the left of your data. If you have a large amount of data, you may find that when you\nscroll across or down to particular cells, the headings scroll out of view. This problem can be resolved by freezing the rows and/or columns that hold the headings.", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "WRAPPING AND MERGING TEXT\nMicrosoft Excel will allow long cell entries to spill across to other adjacent cells to the right as long as those cells are empty. If those cells contain data the spill-over will be chopped off. If you need\nto place long text entries in a cell you can arrange for Microsoft Excel to wrap the text within the cell and also merge that cell with others to accommodate the longer text entry.\n1\n3\n5", - "page_start": 25, - "page_end": 25, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nn\npe\nO\nFile\nBefore starting this exercise you MUST open the file E723 Cell Alignment_9.xlsx...\n Click in cell A5\nThis cell contains a long text entry that spills across several columns…\n Click on the Expand Formula Bar tool to the right of the formula bar to see all of the text\n Click on the Wrap Text\ncommand in the\nAlignment group on the Home tab to wrap the text in cell A5\nNotice how the row height has now increased…\n Hold down the key and click in cell E5 to select the range A5:E5\n Click on the drop arrow for Merge & Centre in the Alignment group and select Merge Cells to merge the cells in the range\n Move the mouse pointer to the bottom of the row 5 heading border and drag the row height up until you reach 30 points", - "page_start": 25, - "page_end": 25, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nn\nBefore starting this exercise you MUST open the file E1317 Charting_1.xlsx…\n Click in cell A3 , hold down , then click in cell G7 to select the range A3:G7\nNote that we have selected the data including headings but excluding the totalling…\n Click on the INSERT then click on Insert Column Chart in the Charts group to see a gallery of Column chart types\ntab,\n Under 2-D Column , click on Clustered Column\nThe chart will be embedded in the worksheet. The chart will be active (selected) and you'll see additional tabs on the ribbon for working with the chart…\n Point to the chart, then click to select it and drag the chart so that it is underneath the data, as shown\n Click in cell A1 to deselect the chart", - "page_start": 46, - "page_end": 46, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "THE CHARTING PROCESS\nCharts provide a way of seeing trends in the data in your worksheet. The charting feature in Excel is extremely flexible and powerful and allows you to create a wide range of charts from\nMicrosoft Excel\nany of the Insert commands in the Charts group on the", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "How to rename a worksheet in Excel ?", - "target_page": 12, - "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "Handy to Know…\n You can rename a worksheet by right-clicking on the worksheet tab to display the shortcut menu and clicking on Rename .\n A worksheet tab name can contain up to 31 characters including spaces, but it is better to keep it short and succinct.\nMicrosoft Excel\n To copy a worksheet into an existing workbook, make sure that you open the destination workbook first to ensure that it is listed in To book in the Move or Copy dialog box.\nMicrosoft Excel", - "page_start": 11, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Sa m e F i le\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_8.xlsx...\n Click on the Admin worksheet tab, hold down , then click on the Shop worksheet tab to select the first three worksheets\n Click in cell A1 to select the cell\n Click on the HOME tab, then click on Italics in the Font group\nThis will italicise the text in cell A1 on this and all other worksheets in the group…\n Click on the Maintenance worksheet tab, then the Shop worksheet tab to see that the changes have been applied here\n Click on the IT worksheet tab to see that the changes have not been applied to this worksheet\nSince this was not part of the grouped sheets the changes have not been applied here. Notice too that clicking on a tab deselects the previous grouping", - "page_start": 14, - "page_end": 14, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "RENAMING A WORKSHEET\nBy default, Excel names worksheets as Sheet1 , Sheet2 , Sheet3 , etc. These names are fine if you are not planning to share the workbook, but changing these to something more relevant\nmakes it much easier to understand the purpose of a worksheet. You can also adjust the horizontal scroll bar to make room for longer, more meaningful worksheet names.", - "page_start": 11, - "page_end": 11, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nn\nBefore starting this exercise you MUST open the file E1324 Worksheet Techniques_1.xlsx…\n Examine the workbook - it currently contains one worksheet named Sheet1\n Click on the New Sheet icon at the end of the worksheet tabs\nA new worksheet named Sheet2 will be inserted. You can also use the keyboard shortcut...\n Press + to insert another new worksheet\nThis sheet is named Sheet3 and is inserted before the currently selected sheet. Now let's delete a sheet...\n Right-click on the Sheet3 worksheet tab to display the shortcut menu\n Select Delete to remove the worksheet\nAs the worksheet contains no data, the sheet will be deleted immediately. If a worksheet contains data, Excel will ask you to confirm your actions...\n Repeat steps 4 and 5 to delete Sheet2", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n You can copy the current worksheet using the HOME tab by clicking on Format in the Cells group, then clicking on Move or Copy Sheet .\n The Before sheet options in the Move or Copy dialog box allow you to position the copied worksheet where you want.\nMicrosoft Excel", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_1.xlsx...\n Right-click on Sheet1 to display the worksheet shortcut menu\n Select Move or Copy to display the Move or Copy dialog box\n Click on Create a copy so it appears ticked, then click on [OK]\nThe new worksheet is named Sheet1 (2). Let's create a 'template' from this worksheet by deleting unwanted data...\n Select the range B7:E9 , then press to clear it\n Repeat step 4 to clear the ranges B14:E23 , G7:J9 and G14:J23 , then press + to return to cell A1\nNow we can copy this 'template' to create additional worksheets...\n Repeat steps 1 to 3 three times to create three copies of the template worksheet - this time without data\nThe final worksheet should be named Sheet1 (5)", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_2.xlsx...\n Point to the vertical dots between the sheet names and the horizontal scroll bar, as shown\nThe pointer will change to a double-headed arrow...\n Click and drag the bar across to the right, to the end of column L , then release the mouse button\n Double-click on Sheet1 (5) to select the worksheet tab name\nThis will also place it into edit mode…\n Type Comms , then press\n Repeat steps 3 and 4 to rename the other worksheets:\nSheet1 (4)\nAdmin\nSheet1 (3)\nShop\nSheet1 (2)\nIT\nSheet1\nMaintenance", - "page_start": 11, - "page_end": 11, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n To insert a worksheet between existing worksheets, right-click on the worksheet tab before which you want to insert a new sheet, then click on Insert to display the Insert dialog box. Select Worksheet and click on [OK] .\n1\n2\n3\n4\n5\nMicrosoft Excel", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "GROUPING WORKSHEETS\nWorksheet grouping enables you to make the same change at once to all selected worksheets. This feature is useful in situations where your worksheets have identical layouts or text. For\nexample, if you want to format the heading for multiple worksheets, you simply group the worksheets, make a change to one worksheet and the other worksheets will reflect the change also.", - "page_start": 14, - "page_end": 14, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nle\ni\nF\ne\nm\nSa\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_6.xlsx...\n Click on the Maintenance worksheet tab\nWe'll copy this completed data to another workbook...\n Right-click on the worksheet tab to display the shortcut menu, then click on Move or Copy to display the Move or Copy dialog box\n Click on the drop arrow for To book , then select (new book)\n Click on Create a copy so it appears ticked\nThis will create a new workbook as well as making a copy of the worksheet...\n Click on\n[OK]\nA new workbook will be created and Maintenance will be the only worksheet in the workbook…\n Save the new workbook as Maintenance.xlsx , then close it", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "I want to freeze a pane in my Excel worksheet ", - "target_page": 16, - "target_passage": "To freeze panes in a worksheet: 1. Click in the cell below and to the right of the area you want to freeze/unfreeze 2. Click on the VIEW tab 3. Click on Freeze Panes in the Window group, then select Freeze Panes ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "To freeze panes in a worksheet :\n1. Click in the cell below and to the right of the area you want to freeze/unfreeze\n2. Click on the VIEW tab\n3. Click on Freeze Panes in the Window group, then select Freeze Panes\nITTraining@sgul.ac.uk\nPage 12\nSt. George's Information Services", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nContinue using the previous file E1324 Worksheet\nwith this exercise, or open the file Techniques_11.xlsx...\n Click on the Maintenance worksheet tab, then spend a few moments examining the worksheet\nDepending on your screen, it is possible that you won't be able to see all of the figures on the screen at once...\n Click in cell B6 to select the cell\n Click on the VIEW tab, click on Freeze Panes in the Window group, then select Freeze Panes\nThin black lines appear above and to the left of the selected cell. This indicates that the areas above and to the left are frozen...\n Scroll to the right until Yearly Average in column L appears next to column A\n Scroll down until Overheads in row 25 is below row 5\n Press + to move to cell B6 - this is our temporary home cell, as the cells above and to the left are frozen\n On the VIEW tab, click on Freeze Panes in the Freeze Panes group, then click on Unfreeze Panes to unfreeze the rows and columns", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nn\nBefore starting this exercise you MUST open the file E1324 Worksheet Techniques_1.xlsx…\n Examine the workbook - it currently contains one worksheet named Sheet1\n Click on the New Sheet icon at the end of the worksheet tabs\nA new worksheet named Sheet2 will be inserted. You can also use the keyboard shortcut...\n Press + to insert another new worksheet\nThis sheet is named Sheet3 and is inserted before the currently selected sheet. Now let's delete a sheet...\n Right-click on the Sheet3 worksheet tab to display the shortcut menu\n Select Delete to remove the worksheet\nAs the worksheet contains no data, the sheet will be deleted immediately. If a worksheet contains data, Excel will ask you to confirm your actions...\n Repeat steps 4 and 5 to delete Sheet2", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n To insert a worksheet between existing worksheets, right-click on the worksheet tab before which you want to insert a new sheet, then click on Insert to display the Insert dialog box. Select Worksheet and click on [OK] .\n1\n2\n3\n4\n5\nMicrosoft Excel", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "For Your Reference…\nTo insert a new worksheet into a workbook :\n Click on the New Sheet icon to the right of the worksheet tabs\nTo delete a worksheet from a workbook :\n Right click on the worksheet tab, then select Delete\nITTraining@sgul.ac.uk\nPage 6\nSt. George's Information Services", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n You can rename a worksheet by right-clicking on the worksheet tab to display the shortcut menu and clicking on Rename .\n A worksheet tab name can contain up to 31 characters including spaces, but it is better to keep it short and succinct.\nMicrosoft Excel\n To copy a worksheet into an existing workbook, make sure that you open the destination workbook first to ensure that it is listed in To book in the Move or Copy dialog box.\nMicrosoft Excel", - "page_start": 11, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_1.xlsx...\n Right-click on Sheet1 to display the worksheet shortcut menu\n Select Move or Copy to display the Move or Copy dialog box\n Click on Create a copy so it appears ticked, then click on [OK]\nThe new worksheet is named Sheet1 (2). Let's create a 'template' from this worksheet by deleting unwanted data...\n Select the range B7:E9 , then press to clear it\n Repeat step 4 to clear the ranges B14:E23 , G7:J9 and G14:J23 , then press + to return to cell A1\nNow we can copy this 'template' to create additional worksheets...\n Repeat steps 1 to 3 three times to create three copies of the template worksheet - this time without data\nThe final worksheet should be named Sheet1 (5)", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n You can copy the current worksheet using the HOME tab by clicking on Format in the Cells group, then clicking on Move or Copy Sheet .\n The Before sheet options in the Move or Copy dialog box allow you to position the copied worksheet where you want.\nMicrosoft Excel", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "UNDERSTANDING WORKBOOKS\nIn Microsoft Excel the data you enter, whether it consists of numbers, text, or formulas, is stored in a file known as a workbook . Workbooks are just like huge electronic books with pages (or\nsheets ) that have been ruled into columns and rows. Before using Excel it is helpful to know what the various parts and elements that make up a workbook are.\n A worksheet (or page) in a workbook contains 16,384 columns that are labelled using letters of the alphabet. The first column in a worksheet is labelled column A , while the last is labelled XFD\n A worksheet (or page) in a workbook contains 1,048,576 rows that are labelled using numbers from 1 to 1,048,576\n Where a column and row intersect we get what is known as a cell . You enter your data into these cells. Each cell in a worksheet can hold up to 32,767 characters - although it would be unrealistic to ever push it this far. Cells are referred to by their column and row labels. For example, in the screen above the cell we are pointing to is C11 - this reference is known as the cell address and is most important as it is frequently used in commands and formulas\n When you start typing something, you want it to appear somewhere in the worksheet. As a consequence when the Status Bar shows Ready mode, at least one cell in the worksheet will be highlighted - this is known as the active cell . In the screen above, the active cell is cell A1 -notice that the column label and the row label also appears coloured to indicate the active cell. You can have more than one active cell - when this occurs you have what is known as a range\n A workbook (as you would expect) is made up of pages known as worksheets . You can have as many sheets in a workbook as your computer resources can accommodate. As a default, a new blank workbook normally has 3 worksheets labelled Sheet1 , Sheet2 , and Sheet3 . Of course these labels are pretty boring and meaningless and can be changed to something more relevant\n The Insert Worksheet button here will insert another worksheet into the current workbook should you need it\nITTraining@sgul.ac.uk\nPage 1\nSt. George's Information Services\nMicrosoft Excel\nMicrosoft Excel", - "page_start": 4, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Sa m e F i le\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_8.xlsx...\n Click on the Admin worksheet tab, hold down , then click on the Shop worksheet tab to select the first three worksheets\n Click in cell A1 to select the cell\n Click on the HOME tab, then click on Italics in the Font group\nThis will italicise the text in cell A1 on this and all other worksheets in the group…\n Click on the Maintenance worksheet tab, then the Shop worksheet tab to see that the changes have been applied here\n Click on the IT worksheet tab to see that the changes have not been applied to this worksheet\nSince this was not part of the grouped sheets the changes have not been applied here. Notice too that clicking on a tab deselects the previous grouping", - "page_start": 14, - "page_end": 14, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What is the msodocexStructTypeArticle type value ?", - "target_page": 21, - "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "DocExComment_BeginStructNode\nmsodocexStructTypeTOC, Description = A table of contents.. msodocexStructTypeTOCI, Description = An item in a table of contents.. msodocexStructTypeExtLink, Description = A link to an external resource.. msodocexStructTypeIntLink, Description = A link to an internal resource.. msodocexStructTypeFootnote, Description = A footnote.. msodocexStructTypeEndnote, Description = An endnote.. msodocexStructTypeTextbox, Description = A text box.. msodocexStructTypeHeader, Description = A block of text forming a header.. msodocexStructTypeFooter, Description = A footer.. msodocexStructInlineShape, Description = An inline shape.. msodocexStructAnnotation, Description = An annotation.. msodocexStructTypeSpanBlock, Description = A block of text.. msodocexStructTypeWorkbook, Description = A workbook.. msodocexStructTypeWorksheet, Description = A worksheet.. msodocexStructTypeMacrosheet, Description = A macrosheet.. msodocexStructTypeDialogsheet, Description = A dialogsheet.. msodocexStructTypeSlide, Description = A slide.. msodocexStructTypeChart, Description = A chart.. msodocexStructTypeDiagram, Description = A SmartArt diagram.. msodocexStructTypeBulletText, Description = Buller text.. msodocexStructTypeTextLine, Description = A line of text.. msodocexStructTypeDropCap, Description = A drop cap.. msodocexStructTypeSection, Description = A section.. msodocexStructTypeAnnotationBegin, Description = The beginning of an annotation.. msodocexStructTypeAnnotationEnd, Description = The end of an annotation.", - "page_start": 21, - "page_end": 21, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrBeginStructNode\niHeadingLevel is the heading level for an msodocexStructTypeHeading.\nidPara is the paragraph id for a P, TOCI, or ListBody.\nidDropCap is the id of an msodocexStructTypeDropCap.\niPage is the page number for an msodocexStructTypePage.\nbt is the line break type for an msodocexStructTypeTextLine.\niListLevel is the list level for an msodocexStructTypeList or msodocexStructTypeListItem.\nlistType is the list type for an msodocexStructTypeListItem.\nidAtn is the id of an msodocexStructTypeAnnotationBegin or msodocexStructTypeAnnotationEnd.\ncpLim is used to determine the nesting order of tables within tables for an msodocexStructTypeTable, msodocexStructTypeTOC, or msodocexStructTypeListBody.\nshapeProperty is for a msodocexStructTypeFigure where the content is a shape, text box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY enumeration.\ntableAttr is the table cell attributes for a msodocexStructTypeTH or msodocexStructTypeTD.\nidTableHeader is the unique id for an msodocexStructTypeTH or msodocexStructTypeTD.\niTargetParentId is the id of the node to reparent an msodocexStructTypeDiagram to.\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE\nノ Expand table\nTable 4. Enumerated values of MSODOCEXLISTTYPE", - "page_start": 8, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "DocExComment_BeginStructNode\nmsodocexStructTypePara, Description = A block of text within an article. Its parent node must be an article.. msodocexStructTypeFigure, Description = A graphical element (for example, an image or collection of shapes) that has a textual representation. The textual representation is the alternate text used for reading or searching the document.. msodocexStructTypeArticle, Description = A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.. msodocexStructTypeHeading, Description = A heading in the text.. msodocexStructTypeTable, Description = A block of text forming a table.. msodocexStructTypeTR, Description = A block of text forming a single row of a table.. msodocexStructTypeTD, Description = A block of text forming a single cell in a table row.. msodocexStructTypeTH, Description = A block of text forming a single header cell in a table row.. msodocexStructTypeList, Description = A block of text forming a list.. msodocexStructTypeListItem, Description = A block of text forming a list item.. msodocexStructTypeListBody, Description = A block of text forming the body of a list item.. msodocexStructTypeDocument, Description = A document.. msodocexStructTypePage, Description = A page in the document.", - "page_start": 20, - "page_end": 20, - "source_file": "office-pdf.pdf" - }, - { - "text": "DocExComment_BeginStructNode\nmsodocexStructTypeParaRTLAttr, Description = A block of text within an article with right-to-left layout.. msodocexStructTypeTableRTLAttr, Description = A block of text forming a table with right-to-left layout.. msodocexStructTypeHeadingRTLAttr, Description = A heading in the text with right-to-left layout.. msodocexStructTypeListItemRTLAttr, Description = A block of text forming a list item with right-to-left layout.. msodocexStructTypeParaUnannotatableAttr, Description = A block of text within an article that is not annotatable.. msodocexStructTypeTHead, Description = The header row area in a table.. msodocexStructTypeTBody, Description = The body area in a table, i.e. the portion between the THead and TFoot.. msodocexStructTypeLabel, Description = A label.. msodocexStructTypeEquation, Description = An equation.. msodocexStructTypeIntLinkNoteRef, Description = A footnote or endnote reference mark link.. msodocexStructTypeTFoot, Description = The footer row area in a table.\nfContentNode Specifies whether a DocExComment_EndStructNode structure marks the end of this structure node. If fContentNode is true , a\nDocExComment_EndStructNode structure closes off the content bounded by the node. If this fContentNode has a false value, then the node does not bound any content.", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" - }, - { - "text": "ノ Expand table\nTable 5. Enumerated values of MSODOCEXSHAPEPROPERTY bit fields\nmsodocexListTypeNone, Description = No bullets or numbering.. msodocexListTypeBulletDisc, Description = Disc-shaped bullets.. msodocexListTypeBulletCircle, Description = Circle-shaped bullets.. msodocexListTypeBulletSquare, Description = Square-shaped bullets.. msodocexListTypeBulletDecimal, Description = Decimal numbering.. msodocexListTypeUpperRoman, Description = Uppercase Roman numeral numbering.. msodocexListTypeLowerRoman, Description = Lowercase Roman numberal numbering.. msodocexListTypeUpperAlpha, Description = Uppercase alphabetic numbering.. msodocexListTypeLowerAlpha, Description = Lowercase alphabetic numbering.", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrBeginStructNode\nTable 4. Enumerated values of MSODOCEXLISTTYPE\nmsodocexLineBreakTypeNormal, Description = Normal line break.. msodocexLineBreakTypeManual, Description = Manual line break.. msodocexLineBreakTypeEOP, Description = End of paragraph.", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrBeginStructNode\ntypedef struct _MsoDocexStructNode { int idNode; MSODOCEXSTRUCTTYPE nodetype; WCHAR* pwchAltText; union { int iHeadingLevel; ULONG idPara; ULONG idDropCap; int iPage; WCHAR* pwchActualText; MSODOCEXLINEBREAKTYPE bt; int iListLevel; MSODOCEXLISTTYPE listType; ULONG idAtn; long cpLim; int shapeProperty; MsoDocexTableAttr tableAttr; WCHAR* idTableHeader; int iTargetParentId; }; } MSODOCEXSTRUCTNODE;\nThe idNode member specifies the ID of the node being passed in the call to HrBeginStructNode . This member may not have a value of 0 . A value of -1 indicates that child nodes do not use the idNodeParent parameter to specify this node as their parent. Instead, this node can be a parent only by enclosing child nodes in the EMF. Multiple nodes can have an ID of -1 . If the ID is not -1 , the value is unique across the document.\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted differently depending on the type of node:", - "page_start": 8, - "page_end": 8, - "source_file": "office-pdf.pdf" - }, - { - "text": "ノ Expand table\nノ\nExpand table\nmsodocexShape, Numeric Value = 0x00000001. msodocexShape, Description = The object is a shape or text box.. msodocexShapeText, Numeric Value = 0x00000002. msodocexShapeText, Description = The object has non-whitespace text.. msodocexShapePath, Numeric Value = 0x00000004. msodocexShapePath, Description = The object has a fill and/or outline.. msodocexShapeAltText, Numeric Value = 0x00000008. msodocexShapeAltText, Description = The object has Alt Text.. msodocexShapeEquation, Numeric Value = 0x00000010. msodocexShapeEquation, Description = The object has text that contains an equation.. msodocexShapeTabelCell, Numeric Value = 0x00000020. msodocexShapeTabelCell, Description = The object is a cell in a table.", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" - }, - { - "text": "ノ Expand table\nmsodocexcommentExternalHyperlink, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentExternalHyperlinkRctfv, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentInternalHyperlink, Structure Type = DocExComment_InternalHyperlink. msodocexcommentInternalHyperlinkRctfv, Structure Type = DocExComment_InternalHyperlink. msodocexcommentColorInfo, Structure Type = DocExComment_ColorInfo. msodocexcommentColorMapEnable, Structure Type = DocExComment_ColorEnable. msodocexcommentBeginTextRun, Structure Type = DocExComment_BeginTextRun. msodocexcommentBeginTextRunRTL, Structure Type = DocExComment_BeginTextRun. msodocexcommentEndTextRun, Structure Type = DocExComment_EndTextRun. msodocexcommentBeginStructNode, Structure Type = DocExComment_BeginStructNode. msodocexcommentEndStructNode, Structure Type = DocExComment_EndStructNode. msodocexcommentUnicodeForNextTextOut, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentUnicodeForNextTextOutRTL, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentEPSColor, Structure Type = DocExComment_EPSColor. msodocexcommentEPSCMYKJPEG, Structure Type = DocExComment_EPSColorCMYKJPEG. msodocexcommentEPSSpotImage, Structure Type = DocExComment_EPSColorSpotImage. msodocexcommentEPSStart, Structure Type = DocExComment_EPSStart. msodocexcommentPageName, Structure Type = DocExComment_PageName. msodocexcommentTransparent, Structure Type = DocExComment_Transparent", - "page_start": 14, - "page_end": 14, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrAddDocumentMetadataString\nPublisher calls the HrAddDocumentMetadataString method to specify document metadata in the form of a Unicode string.\nC++ HRESULT HrAddDocumentMetadataString( MSODOCEXMETADATA metadataType, const WCHAR* pwchValue );\nThe metadatatype parameter specifies the type of metadata represented by the string. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nTable 8. Enumerated values of MSODOCEXMETADATA\nExpand table\nmsodocexMetadataTitle, Description = The title of the document.. msodocexMetadataAuthor, Description = The author of the document. msodocexMetadataSubject, Description = String that describes the subject matter of the document (for example, business or science).. msodocexMetadataKeywords, Description = Keyword relevant to the document content.. msodocexMetadataCreator, Description = The creator of the document, possibly distinct from the author.. msodocexMetadataProducer, Description = The producer of the document, possibly distinct from the author or creator.. msodocexMetadataCategory, Description = String that describes the type of document (for example, memo, article, or book).. msodocexMetadataStatus, Description = Status of the document. This field can reflect where the document is in the publication process (for example, draft or final).. msodocexMetadataComments, Description = Miscellaneous comments relevant to the document.\nFor a given document, each metadata type can have only one string associated with it. So, for example, if the document has multiple keywords, they are passed to the add-in as one concatenated string.\nThe pwchValue parameter specifies a Unicode string that contains the metadata itself.\nHow the add-in incorporates the text-string metadata into the exported document depends on the implementation details of the export code and the type of fixed-format used in the exported document.", - "page_start": 33, - "page_end": 34, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What are vector colors ?", - "target_page": 29, - "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nThe generic formalism of the computation of the optical conductivity and the optical integral has been discussed several times in the literature 21-23,26,29 and we\n4\njust list the formulas that we used in our computations. The conductivity σ (Ω) and the optical integral W ( ω c ) are given by (see for example Ref. 35).\nσ ' (Ω) = Im [ -Π(Ω) Ω+ iδ ] = -Π '' (Ω) Ω + πδ (Ω) Π ' (Ω) (7a)\nW ( ω c ) = ∫ ω c 0 σ ' (Ω) d Ω = -∫ ω c 0+ Π '' (Ω) Ω d Ω + π 2 Π ' (0) (7b)\nwhere ' X ' ' and ' X '' ' stand for real and imaginary parts of X . We will restrict with T = 0. The polarization operator Π(Ω) is (see Ref. 36)\nΠ( i Ω) = T ∑ ω ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ( G ( iω, /vector k ) G ( iω + i Ω , /vector k ) + F ( iω, /vector k ) F ( iω + i Ω , /vector k ) ) (8a)\nΠ ' (Ω) = 1 π 2 ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ∫ ' ∫ ' dxdy ( G '' ( x, /vector k ) G '' ( y, /vector k ) + F '' ( x, /vector k ) F '' ( y, /vector k ) ) n F ( y ) -n F ( x ) y -x (8c)\nΠ '' (Ω) = -1 π ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ∫ 0 -Ω dω ( G '' ( ω, /vector k ) G '' ( ω +Ω , /vector k ) + F '' ( ω, /vector k ) F '' ( ω +Ω , /vector k ) ) (8b)", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" - }, - { - "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\nThe model Hamiltonian we use in our simulations is the minimal one able to describe helimagnetic structures:\nH = -  J 0 ∑ 〈 ij 〉 /vector S i · /vector S j + J 1 ∑ 〈 ik 〉 /vector S i · /vector S k + J 2 ∑ 〈 il 〉 /vector S i · /vector S l   . (1)\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "Extended Color Support\nTo support extended color spaces in Publisher, additional EMF semantic records and interfaces are needed because EMF only supports RGB (red-green-black) colors. Extended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, which are commonly used in commercial printing.\nPublisher uses color mapping to represent extended colors in the document EMF. Publisher builds a color table for all colors used in the document and replaces actual colors with color IDs in the EMF. The type for the color ID is COLORREF , which is the\nsame type that is used for RGB color. For information about the COLORREF structure, see COLORREF.\nTo resolve color IDs in the EMF back to the extend color space, the add-in calls back to Publisher through the HrResolveColor method of the IMsoDocExporterSite interface. The add-in passes Publisher an interface pointer to an IDOCEXCOLOR interface as one of the parameters to HrResolveColor . Publisher takes the color IDs, also specified in the call to HrResolveColor , converts them to extended color (RGB, CMYK, or spot color), and passes them back to the add-in through the methods in the IDOCEXCOLOR interface.", - "page_start": 27, - "page_end": 28, - "source_file": "office-pdf.pdf" - }, - { - "text": "I. INTRODUCTION\n∫ ' ∞ ' 0 Reσ (Ω) d Ω = W K = πe 2 2 N ∑ /vector k ∇ 2 /vector k x ε /vector k n /vector k (3)\nwhere n /vector k is the electronic distribution function and ε /vector k is the band dispersion. Prime in the upper limit of the integration has the practical implication that the upper limit is much larger than the bandwidth of a given band which crosses the Fermi level, but smaller than the frequencies of interband transitions. Interactions with external objects, e.g., phonons or impurities, and interactions between fermions are indirectly present in the distribution function which is expressed via the full fermionic Green's function as n /vector k = T ∑ m G ( /vector k, ω m ). For /epsilon1 k = k 2 / 2 m , ∇ 2 /vector k x ε /vector k = 1 /m , W K = πne 2 / (2 m ), and Kubo sum rule reduces to Eq. (1). In general, however, ε /vector k is a lattice dispersion, and Eqs. (1) and (3) are different. Most important, W K in Eq. (3) generally depends on T and on the state of the system because of n /vector k . In this situation, the temperature evolution of the optical integral does not reduce to a simple redistribution of the spectral weight - the whole spectral weight inside the conduction band changes with T . This issue was first studied in detail by Hirsch 4 who introduced the now-frequently-used notation 'violation of the conductivity sum rule'.\nIn reality, as already pointed out by Hirsch, there is no true violation as the change of the total spectral weight", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "Vector Color and Recolored Images\nVector colors are any COLORREF values that the add-in receives from Publisher. For example, text color, line stroke color, and color for metafile recolor. When color mapping is enabled, Publisher uses a color ID for COLORREF rather than a real RGB color value. If Publisher provides the add-in an IMsoDocExporterSite interface pointer by calling the SetDocExporterSite method of the IMsoDocExporter interface, the add-in should always call the IMsoDocExporterSite::HrResolveColor method to convert the COLORREF to an extended color, which the add-in receives through the methods in the IDOCEXCOLOR interface.\nTo support vector color mapping, the add-in needs to do the following:\nImplement class support for an IDOCEXCOLOR interface. The methods in this interface enable Publisher to pass extended color back to the add-in.\nCache the following color state values from the semantic records in the EMF.\nSet foreground color for recoloring. This is set through the DocExComment_ColorInfo structure.\nSet background color for recoloring. This is set through the DocExComment_ColorInfo structure.\nDetermine when color mapping is enabled. This is set through the DocExComment_ColorEnable structure.\nFor a vector color, create an IDOCEXCOLOR interface with the color ID, so that IDOCEXCOLOR::GetUnresolvedRGB returns the color ID. The add-in should call the IMsoDocExporterSite::HrResolveColor method with the IDOCEXCOLOR interface and cached color states. Publisher calls the IDOCEXCOLOR interface methods with the final color, which can be RGB, CMYK, spot, or registration tint.\nWhen either foreground color or background color for recoloring is specified from an EMF semantic record, the add-in should recolor images in the add-in (for example, metafiles or raster pictures).", - "page_start": 28, - "page_end": 29, - "source_file": "office-pdf.pdf" - }, - { - "text": "3.1. Creating and Using a POMDP\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [23], a Python library for implementing simulations of AIF in discrete state spaces. Those already acquainted with pymdp should find the syntax here familiar. ActiveInference can be installed as normal from the official Julia General Registry using the Julia's native package manager Pkg:\nIt can then be loaded into the current project environment:\n☎\n✆\n☎\nCentral to the package is the AIF object. This is a structure containing all the components of the generative model, as well as the dynamic belief states and the various settings needed to perform AIF, and is used in conjunction with most of the high-level functions of the package. An AIF object can be created with the init_aif function, which takes as arguments the components of the generative model and a dictionary of various settings and parameters:\n✆\n✞ using Pkg Pkg.add(ActiveInference) ✝\n✞ using ActiveInference ✝\nEntropy 2025 , 27 , 62\n12 of 33\n✞ # Create AIF object aif = init_aif( A::Vector{Array{T, N}}, # A-matrices B::Vector{Array{T, N}}; # B-matrices C::Vector{Array{Real}}, # C-matrices (optional) D::Vector{Vector{Real}}, # D-matrices (optional) E::Vector{T}, # E-vector (optional) pA::Union{Vector{Array{T, N}}, Nothing}, # Dirichlet priors for A-matrices (optional) pB::Union{Vector{Array{T, N}}, Nothing}, # Dirichlet priors for B-matrices (optional) pD::Union{Vector{Array{Real}}, Nothing}, # Dirichlet priors for D-vectors (optional) parameters::Dict{String, Real}, # Dictionary containing other parameters (optional) settings::Dict{String, Any} # Dictionary containing settings (optional) ) ✝", - "page_start": 10, - "page_end": 11, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "DocExComment_ColorInfo\nThe DocExComment_ColorInfo structure specifies color-state information for the EMF. For more information about this structure, see the section Extended Color Support.\nC++ struct DocExComment_ColorInfo { DWORD ident {}; DWORD iComment {}; COLORREF clr { 0 }; BOOL fForeColor {}; };\nThe members of the DocExComment_ColorInfo structure are as follows:\nident Specifies the constant value, msodocexsignature, which identifies this EMF comment as containing semantic information.\niComment Specifies the MSODOCEXCOMMENT value, msodocexcommentColorInfo.\nclr Specifies a color ID that represents a current color state in the EMF.\nfForeColor Specifies whether the color ID in the clr member represents a foreground color or a background color. If this member has a value of true , the\ncolor ID represents a foreground color. If this member has a value of false , the color ID represents a background color.", - "page_start": 17, - "page_end": 18, - "source_file": "office-pdf.pdf" - }, - { - "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nwhere ∫ ' denotes the principal value of the integral, ∑ /vector k is understood to be 1 N ∑ /vector k ,( N is the number of lattice sites), n F ( x ) is the Fermi function which is a step function at zero temperature, G and F are the normal and anomalous Greens functions. given by 37\nFor a NS, G ( ω, /vector k ) = 1 ω -Σ( k, ω ) -ε /vector k + iδ (9a)\nFor a SCS, G ( ω, /vector k ) = Z k,ω ω + ε /vector k Z 2 k,ω ( ω 2 -∆ 2 k,ω ) -ε 2 /vector k + iδsgn ( ω ) (9b)\nF ( ω, /vector k ) = Z k,ω ∆ k,ω Z 2 k,ω ( ω 2 -∆ 2 k,ω ) -ε 2 /vector k + iδsgn ( ω ) (9c)\nwhere Z k,ω = 1 -Σ( k,ω ) ω , and ∆ k,ω , is the SC gap. Following earlier works 31,33 , we assume that the fermionic self-energy Σ( k, ω ) predominantly depends on frequency and approximate Σ( k, ω ) ≈ Σ( ω ) and also neglect the frequency dependence of the gap, i.e., approximate ∆ k,ω by a d -wave ∆ k . The lattice dispersion ε /vector k is taken from Ref. 38. To calculate W K , one has to evaluate the Kubo term in Eq.3 wherein the distribution function n /vector k , is calculated from\nn ( ε /vector k ) = -2 ∫ 0 -∞ dω 2 π G '' ( ω, /vector k ) (10)\nThe 2 is due to the trace over spin indices. We show the distribution functions in the NS and SCS under different circumstances in Fig 2.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" - }, - { - "text": "Color from EPS Files\nEncapsulated Postscript (EPS) is a metafile type that supports extended color spaces. User who embed EPS images in a Publisher document expect the color information to be used in the fixed-format output. Inside Publisher, the EPS is converted to an EMF with EPS-related semantic records. This EMF is then embedded in the page EMF file that the application passes to the add-in.\nTo support color in EPS files, the add-in needs to do the following:\nCall the IMsoDocExporterSite::SetEPSInfo method for DocExComment_EPSColor records encountered in the EMF.\nExtract the CMYK image from the DocExComment_EPSColorCMYKJPEG record in the EMF. This record contains a binary object that is the actual CMYK JPEG file stream. Use it to replace the RGB image specified in the subsequent call to the StretchDIBits function.\nThe DocExComment_EPSColorSpotImage record provides spot color information for the subsequent RGB image, which is always an index image. The add-in needs to convert the spot image to the target color space.\nThe add-in can optionally call the IMsoDocExporterSite:: HrGetSpotRecolorInfo method to obtain the document's target color from Publisher. Then the add-in can recolor the subsequent RGB image by mapping colors from the palette of the RGB image to flTintMin and flTintMax tints specified in the\nDoxExComment_EPSColorSpotImage palette is used for the mapping.\nrecord. The luminosity for each color of the\nNote that the DocExComment_EPSStart record is only informational. The add-in can ignore this record.", - "page_start": 29, - "page_end": 30, - "source_file": "office-pdf.pdf" - }, - { - "text": "A. The BCS case\nFor a constant DOS, ∆ W ( ω c ) = W SC ( ω c ) -W NS ( ω c ) is zero at ω c = ∞ and Kubo sum rule reduces to FGT sum rule. In Fig. 3 we plot for this case ∆ W ( ω c ) as a function of the cutoff ω c for different Γ ' s . The plot shows the two well known features: zero-crossing point is below 2∆ in the clean limit Γ << ∆ and is roughly 2Γ in the dirty limit 21,40 The magnitude of the 'dip' decreases quite rapidly with increasing Γ. Still, there is always a point of zero crossing and ∆ W ( ω c ) at large ω c approaches zero from below.\nWe now perform the same calculations in the presence of lattice dispersion. The results are summarized in Figs 4,5, and 6.\nFig 4 shows conductivities σ ( ω ) in the NS and the SCS and Kubo sums W K plotted against impurity scattering Γ. We see that the optical integral in the NS is always greater than in the SCS. The negative sign of ∆ W K is simply the consequence of the fact that n k is larger in the NS for /epsilon1 k < 0 and smaller for /epsilon1 k < 0, and ∇ 2 ε /vector k closely follows -ε /vector k for our choice of dispersion 38 ), Hence n k is larger in the NS for ∇ 2 ε /vector k > 0 and smaller for ∇ 2 ε /vector k < 0 and the Kubo sum rule, which is the integral of the product of n k and ∇ 2 ε /vector k (Eq. 3), is larger in the normal state.\nWe also see from Fig. 4 that ∆ W K decreases with Γ reflecting the fact that with too much impurity scattering there is little difference in n k between NS and SCS.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0764.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What are msodocexMetadataComments ?", - "target_page": 35, - "target_passage": "Miscellaneous comments relevant to the document.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "HrAddDocumentMetadataDate\nTable 9. Enumerated values of MSODOCEXMETADATA\nmsodocexMetadataCreationDate, Description = The creation date for the document.. msodocexMetadataModDate, Description = The last-modified date for the document.", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrAddDocumentMetadataString\nPublisher calls the HrAddDocumentMetadataString method to specify document metadata in the form of a Unicode string.\nC++ HRESULT HrAddDocumentMetadataString( MSODOCEXMETADATA metadataType, const WCHAR* pwchValue );\nThe metadatatype parameter specifies the type of metadata represented by the string. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nTable 8. Enumerated values of MSODOCEXMETADATA\nExpand table\nmsodocexMetadataTitle, Description = The title of the document.. msodocexMetadataAuthor, Description = The author of the document. msodocexMetadataSubject, Description = String that describes the subject matter of the document (for example, business or science).. msodocexMetadataKeywords, Description = Keyword relevant to the document content.. msodocexMetadataCreator, Description = The creator of the document, possibly distinct from the author.. msodocexMetadataProducer, Description = The producer of the document, possibly distinct from the author or creator.. msodocexMetadataCategory, Description = String that describes the type of document (for example, memo, article, or book).. msodocexMetadataStatus, Description = Status of the document. This field can reflect where the document is in the publication process (for example, draft or final).. msodocexMetadataComments, Description = Miscellaneous comments relevant to the document.\nFor a given document, each metadata type can have only one string associated with it. So, for example, if the document has multiple keywords, they are passed to the add-in as one concatenated string.\nThe pwchValue parameter specifies a Unicode string that contains the metadata itself.\nHow the add-in incorporates the text-string metadata into the exported document depends on the implementation details of the export code and the type of fixed-format used in the exported document.", - "page_start": 33, - "page_end": 34, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrAddDocumentMetadataDate\nPublisher calls the HrAddDocumentMetadataDate method to specify document metadata in the form of a FILETIME structure.\nC++ HRESULT HrAddDocumentMetadataDate( MSODOCEXMETADATA metadataType, const FILETIME* pftLocalTime );\nThe metadatatype parameter specifies the type of metadata represented by the FILETIME structure. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nノ\nExpand table\nTable 9. Enumerated values of MSODOCEXMETADATA", - "page_start": 34, - "page_end": 35, - "source_file": "office-pdf.pdf" - }, - { - "text": "ノ Expand table\nmsodocexcommentExternalHyperlink, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentExternalHyperlinkRctfv, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentInternalHyperlink, Structure Type = DocExComment_InternalHyperlink. msodocexcommentInternalHyperlinkRctfv, Structure Type = DocExComment_InternalHyperlink. msodocexcommentColorInfo, Structure Type = DocExComment_ColorInfo. msodocexcommentColorMapEnable, Structure Type = DocExComment_ColorEnable. msodocexcommentBeginTextRun, Structure Type = DocExComment_BeginTextRun. msodocexcommentBeginTextRunRTL, Structure Type = DocExComment_BeginTextRun. msodocexcommentEndTextRun, Structure Type = DocExComment_EndTextRun. msodocexcommentBeginStructNode, Structure Type = DocExComment_BeginStructNode. msodocexcommentEndStructNode, Structure Type = DocExComment_EndStructNode. msodocexcommentUnicodeForNextTextOut, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentUnicodeForNextTextOutRTL, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentEPSColor, Structure Type = DocExComment_EPSColor. msodocexcommentEPSCMYKJPEG, Structure Type = DocExComment_EPSColorCMYKJPEG. msodocexcommentEPSSpotImage, Structure Type = DocExComment_EPSColorSpotImage. msodocexcommentEPSStart, Structure Type = DocExComment_EPSStart. msodocexcommentPageName, Structure Type = DocExComment_PageName. msodocexcommentTransparent, Structure Type = DocExComment_Transparent", - "page_start": 14, - "page_end": 14, - "source_file": "office-pdf.pdf" - }, - { - "text": "ノ Expand table\nノ\nExpand table\nmsodocexShape, Numeric Value = 0x00000001. msodocexShape, Description = The object is a shape or text box.. msodocexShapeText, Numeric Value = 0x00000002. msodocexShapeText, Description = The object has non-whitespace text.. msodocexShapePath, Numeric Value = 0x00000004. msodocexShapePath, Description = The object has a fill and/or outline.. msodocexShapeAltText, Numeric Value = 0x00000008. msodocexShapeAltText, Description = The object has Alt Text.. msodocexShapeEquation, Numeric Value = 0x00000010. msodocexShapeEquation, Description = The object has text that contains an equation.. msodocexShapeTabelCell, Numeric Value = 0x00000020. msodocexShapeTabelCell, Description = The object is a cell in a table.", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" - }, - { - "text": "HrBeginStructNode\niHeadingLevel is the heading level for an msodocexStructTypeHeading.\nidPara is the paragraph id for a P, TOCI, or ListBody.\nidDropCap is the id of an msodocexStructTypeDropCap.\niPage is the page number for an msodocexStructTypePage.\nbt is the line break type for an msodocexStructTypeTextLine.\niListLevel is the list level for an msodocexStructTypeList or msodocexStructTypeListItem.\nlistType is the list type for an msodocexStructTypeListItem.\nidAtn is the id of an msodocexStructTypeAnnotationBegin or msodocexStructTypeAnnotationEnd.\ncpLim is used to determine the nesting order of tables within tables for an msodocexStructTypeTable, msodocexStructTypeTOC, or msodocexStructTypeListBody.\nshapeProperty is for a msodocexStructTypeFigure where the content is a shape, text box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY enumeration.\ntableAttr is the table cell attributes for a msodocexStructTypeTH or msodocexStructTypeTD.\nidTableHeader is the unique id for an msodocexStructTypeTH or msodocexStructTypeTD.\niTargetParentId is the id of the node to reparent an msodocexStructTypeDiagram to.\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE\nノ Expand table\nTable 4. Enumerated values of MSODOCEXLISTTYPE", - "page_start": 8, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "DocExComment_BeginStructNode\nmsodocexStructTypeTOC, Description = A table of contents.. msodocexStructTypeTOCI, Description = An item in a table of contents.. msodocexStructTypeExtLink, Description = A link to an external resource.. msodocexStructTypeIntLink, Description = A link to an internal resource.. msodocexStructTypeFootnote, Description = A footnote.. msodocexStructTypeEndnote, Description = An endnote.. msodocexStructTypeTextbox, Description = A text box.. msodocexStructTypeHeader, Description = A block of text forming a header.. msodocexStructTypeFooter, Description = A footer.. msodocexStructInlineShape, Description = An inline shape.. msodocexStructAnnotation, Description = An annotation.. msodocexStructTypeSpanBlock, Description = A block of text.. msodocexStructTypeWorkbook, Description = A workbook.. msodocexStructTypeWorksheet, Description = A worksheet.. msodocexStructTypeMacrosheet, Description = A macrosheet.. msodocexStructTypeDialogsheet, Description = A dialogsheet.. msodocexStructTypeSlide, Description = A slide.. msodocexStructTypeChart, Description = A chart.. msodocexStructTypeDiagram, Description = A SmartArt diagram.. msodocexStructTypeBulletText, Description = Buller text.. msodocexStructTypeTextLine, Description = A line of text.. msodocexStructTypeDropCap, Description = A drop cap.. msodocexStructTypeSection, Description = A section.. msodocexStructTypeAnnotationBegin, Description = The beginning of an annotation.. msodocexStructTypeAnnotationEnd, Description = The end of an annotation.", - "page_start": 21, - "page_end": 21, - "source_file": "office-pdf.pdf" - }, - { - "text": "ノ Expand table\nTable 5. Enumerated values of MSODOCEXSHAPEPROPERTY bit fields\nmsodocexListTypeNone, Description = No bullets or numbering.. msodocexListTypeBulletDisc, Description = Disc-shaped bullets.. msodocexListTypeBulletCircle, Description = Circle-shaped bullets.. msodocexListTypeBulletSquare, Description = Square-shaped bullets.. msodocexListTypeBulletDecimal, Description = Decimal numbering.. msodocexListTypeUpperRoman, Description = Uppercase Roman numeral numbering.. msodocexListTypeLowerRoman, Description = Lowercase Roman numberal numbering.. msodocexListTypeUpperAlpha, Description = Uppercase alphabetic numbering.. msodocexListTypeLowerAlpha, Description = Lowercase alphabetic numbering.", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "DocExComment_EndStructNode\nThe DocExComment_EndStructNode structure marks the end of the content that is decorated by the information in the DocExComment_BeginStructNode .\nC++ struct DocExComment_EndStructNode { DWORD ident {}; DWORD iComment {}; };\nThe members of the DocExComment_EndStructNode structure are as follows:\nident Specifies the constant value, msodocexsignature, which identifies this EMF comment as containing semantic information.\niComment Specifies the MSODOCEXCOMMENT value, msodocexcommentEndStructNode.", - "page_start": 23, - "page_end": 23, - "source_file": "office-pdf.pdf" - }, - { - "text": "DocExComment_BeginStructNode\nmsodocexStructTypeParaRTLAttr, Description = A block of text within an article with right-to-left layout.. msodocexStructTypeTableRTLAttr, Description = A block of text forming a table with right-to-left layout.. msodocexStructTypeHeadingRTLAttr, Description = A heading in the text with right-to-left layout.. msodocexStructTypeListItemRTLAttr, Description = A block of text forming a list item with right-to-left layout.. msodocexStructTypeParaUnannotatableAttr, Description = A block of text within an article that is not annotatable.. msodocexStructTypeTHead, Description = The header row area in a table.. msodocexStructTypeTBody, Description = The body area in a table, i.e. the portion between the THead and TFoot.. msodocexStructTypeLabel, Description = A label.. msodocexStructTypeEquation, Description = An equation.. msodocexStructTypeIntLinkNoteRef, Description = A footnote or endnote reference mark link.. msodocexStructTypeTFoot, Description = The footer row area in a table.\nfContentNode Specifies whether a DocExComment_EndStructNode structure marks the end of this structure node. If fContentNode is true , a\nDocExComment_EndStructNode structure closes off the content bounded by the node. If this fContentNode has a false value, then the node does not bound any content.", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What are the total operating expenses of Wikimedia foundation in 2024 ?", - "target_page": 6, - "target_passage": "178,471,109", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "WIKIMEDIA FOUNDATION, INC.\nConsolidated Statements of Activities\nYears ended June 30, 2024 and 2023", - "page_start": 5, - "page_end": 5, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "WIKIMEDIA FOUNDATION, INC.\nNotes to Consolidated Financial Statements June 30, 2024 and 2023", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(10) Related Party Transactions\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation ' s expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.\n17\n(Continued)", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "WIKIMEDIA FOUNDATION, INC.\nThe Board of Trustees\nWikimedia Foundation, Inc:", - "page_start": 2, - "page_end": 2, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation's existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(o) Collaborative Arrangement\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the Wikibase software to support the Wikidata project, which acts as central storage for the structured data of its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. Both the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation also grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the Wikibase software. Since the project is part of the Foundation's mission to make knowledge accessible\n10\n(Continued)", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(6) Functional Allocation of Expenses\nCosts of providing the Foundation's activities have been summarized below on a functional basis. Programs comprise various initiatives that focus on (1) building the technological and operating platform that enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, growing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in key geographic areas, mobile application development, and bottom-up innovation, all of which support Wikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for which the Foundation is reimbursed. The allocation between programs, general and administrative, and fundraising expenses is based on personnel and related costs and other operating expenses such as rent and office expenses using estimates of time spent or percentage of utilization by headcounts, as well as\n14\n(Continued)", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(a) Organization and Purpose\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "WIKIMEDIA FOUNDATION, INC.\nConsolidated Financial Statements\nJune 30, 2024 and 2023\n(With Independent Auditors' Report Thereon)\nTable of Contents", - "page_start": 0, - "page_end": 1, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nSalaries and benefits, 2024.Programs = $ 83,645,901. Salaries and benefits, 2024.General and administrative = 14,018,534. Salaries and benefits, 2024.Fundraising = 9,129,525. Salaries and benefits, 2024.Total = 106,793,960. Awards and grants, 2024.Programs = 26,820,080. Awards and grants, 2024.General and administrative = -. Awards and grants, 2024.Fundraising = -. Awards and grants, 2024.Total = 26,820,080. Internet hosting, 2024.Programs = 3,116,257. Internet hosting, 2024.General and administrative = 188. Internet hosting, 2024.Fundraising = -. Internet hosting, 2024.Total = 3,116,445. In-kind service expenses, 2024.Programs = 228,338. In-kind service expenses, 2024.General and administrative = 35,138. In-kind service expenses, 2024.Fundraising = -. In-kind service expenses, 2024.Total = 263,476. Donation processing expenses, 2024.Programs = -. Donation processing expenses, 2024.General and administrative = -. Donation processing expenses, 2024.Fundraising = 7,547,718. Donation processing expenses, 2024.Total = 7,547,718. Professional service expenses, 2024.Programs = 9,670,261. Professional service expenses, 2024.General and administrative = 1,870,513. Professional service expenses, 2024.Fundraising = 1,549,266. Professional service expenses, 2024.Total = 13,090,040. Other operating expenses, 2024.Programs = 6,420,517. Other operating expenses, 2024.General and administrative = 3,808,725. Other operating expenses, 2024.Fundraising = 568,898. Other operating expenses, 2024.Total = 10,798,140. Travel and conferences, 2024.Programs = 4,979,409. Travel and conferences, 2024.General and administrative = 536,887. Travel and conferences, 2024.Fundraising = 308,683. Travel and conferences, 2024.Total = 5,824,979. Depreciation and amortization, 2024.Programs =", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What external events can affect Wikimedia Fundation in raising funds ?", - "target_page": 8, - "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(10) Related Party Transactions\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation ' s expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.\n17\n(Continued)", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation's existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(b) Risks and Uncertainties\nThe Foundation's operations are funded primarily by public donations from individuals as well as gifts from foundations and corporations. External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds. As of the date of this report, the Foundation has not experienced an adverse impact on its business operations.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(o) Collaborative Arrangement\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the Wikibase software to support the Wikidata project, which acts as central storage for the structured data of its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. Both the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation also grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the Wikibase software. Since the project is part of the Foundation's mission to make knowledge accessible\n10\n(Continued)", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "WIKIMEDIA FOUNDATION, INC.\nThe Board of Trustees\nWikimedia Foundation, Inc:", - "page_start": 2, - "page_end": 2, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(a) Organization and Purpose\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(6) Functional Allocation of Expenses\nCosts of providing the Foundation's activities have been summarized below on a functional basis. Programs comprise various initiatives that focus on (1) building the technological and operating platform that enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, growing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in key geographic areas, mobile application development, and bottom-up innovation, all of which support Wikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for which the Foundation is reimbursed. The allocation between programs, general and administrative, and fundraising expenses is based on personnel and related costs and other operating expenses such as rent and office expenses using estimates of time spent or percentage of utilization by headcounts, as well as\n14\n(Continued)", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Promoting environmentally-aware management and supporting business ventures in China through the fund\nIn the past, SMBC also worked to provide In the past, SMBC also worked to provide funding to the support creation of platforms funding to the support creation of platforms for growth in Japan. Now, working through for growth in Japan. Now, working through the Bank of Japan's 'Fund-supply measure the Bank of Japan's 'Fund-supply measure to support strengthening the foundations to support strengthening the foundations for economic growth' loan program, it for economic growth' loan program, it has established the Environmentally has established the Environmentally Responsible Company Support Fund and Responsible Company Support Fund and the Environmental Facilities Support t he Environmental Facilities Support Fund, in support of companies with Fund, in support of companies with environmentally-conscious managements, environmentally-conscious managements, and which invest in environmental facilities. and which invest in environmental facilities. Given the wave of Japanese companies Given the wave of Japanese companies setting up operations in China setting up operations in China's fast-growings fast-growing market, the bank has also established a China market, the bank has also established a China Business Support Fund to meet the funding Business Support Fund to meet the funding needs of companies that plan to make new needs of companies that plan to make new investments in subsidiaries in China. investments in subsidiaries in China.\nFor further details, please see our website.\nName\nEnvironmentally Responsible Environmentally Responsible Company Support Fund Company Support Fund Environmental Facilities Environmental Facilities Support Fund Support Fund\nSize of fund\nOutline\nName\n¥50 billion ¥50 billion\nThe fund supports companies The fund supports companies with environmentally-aware with environmentally-aware managements or involvement in managements or involvement in environmental businesses environmental businesses\nChina Business Support Fund China Business Support Fund\n¥50 billion ¥50 billion\nThe fund supports for companies The fund supports for companies considering moving into China, or considering moving into China, or expanding their business there expanding their business there", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "WIKIMEDIA FOUNDATION, INC.\nNotes to Consolidated Financial Statements June 30, 2024 and 2023", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(d) Financial Statement Presentation\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or absence of donor-imposed restrictions in accordance with Accounting Standards Codification (ASC) Topic 958, Not-for-Profit Entities .\nNet assets without donor restrictions represent unrestricted resources available to support operations and also include previously temporarily restricted resources, which have become available for use by the Foundation in accordance with the intentions of donors.\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in accordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied and removed by the actions of the Foundation according to the terms of the contribution by the donor.\n6\n(Continued)", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What include Wikimedia Fundation restricted cash ?", - "target_page": 9, - "target_passage": "Restricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "(10) Related Party Transactions\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation ' s expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.\n17\n(Continued)", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "WIKIMEDIA FOUNDATION, INC.\nThe Board of Trustees\nWikimedia Foundation, Inc:", - "page_start": 2, - "page_end": 2, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(o) Collaborative Arrangement\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the Wikibase software to support the Wikidata project, which acts as central storage for the structured data of its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. Both the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation also grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the Wikibase software. Since the project is part of the Foundation's mission to make knowledge accessible\n10\n(Continued)", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation's existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "(a) Organization and Purpose\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Statements of Cash Flows\nFor purposes of reporting cash flows, cash and cash equivalents include cash on hand, amounts due from banks, and federal funds sold.", - "page_start": 74, - "page_end": 74, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "(i) Cash\nFor the purposes of the statements of cash flows, cash includes cash on hand, cash at bank and short-term deposits at call.\nAnnual Report 2004", - "page_start": 55, - "page_end": 55, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Cash Flows - Operating Activities\nTrends in our operating cash flows tend to follow trends in our operating income, excluding non-cash charges, since our business is primarily cash-based. Cash flow from operations in 2004 increased from 2003 due to higher operating income offset by higher tax payments. Cash flow from operations in 2003 decreased from 2002, resulting from the decrease in operating income and higher cash paid for taxes.\nAt December 31, 2004 and 2003, we held cash and cash equivalents of $435 million and $280 million, respectively. We require a certain amount of cash on hand to\noperate our resorts. Beyond our cash on hand, we utilize a company-wide cash management system to minimize the amount of cash held in banks. Funds are swept from accounts at our resorts daily into central bank accounts, and excess funds are invested overnight or are used to repay borrowings under our bank credit facilities. Included in cash and cash equivalents at December 31, 2004 is $141 million received from the sale of MGM Grand Australia and still held in Australia, pending clarification of the tax rule for repatriated earnings, as discussed earlier.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "(e) Cash and Cash Equivalents\nThe Foundation manages its cash through major financial institutions. At June 30, 2024 and 2023, the carrying amount of the Foundation's general ledger cash held primarily in nationally recognized financial institutions is $60.0 million and $63.9 million, respectively. Cash balances are insured by the Federal Deposit Insurance Corporation (FDIC) up to the applicable limits. Cash balances held in these financial institutions at June 30, 2024 and 2023 exceed the applicable FDIC insurance limits. The Foundation's current practice is to maintain at least four months of cash and cash equivalents to support a combination of operating cash and a current reserve fund. The Foundation considers all highly liquid investments with an original maturity of three months or less when purchased to be cash equivalents. Cash equivalents of $22.8 million and $12.0 million as of June 30, 2024 and 2023, respectively, are considered Level 1 under ASC Topic 820, Fair Value Measurement .", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "STATEMENTS OF CONSOLIDATED CASH FLOWS\non Cash, 2011 -- = 2,883. Effect of Exchange Rate Changes on Cash, 2010-- = 1,109. (Decrease) increase in cash and cash equivalents, 2012 = (12,650 ). (Decrease) increase in cash and cash equivalents, 2011 -- = (84,685 ). (Decrease) increase in cash and cash equivalents, 2010-- = 148,135. Cash and cash equivalents at beginning of year, 2012 = 91,092. Cash and cash equivalents at beginning of year, 2011 -- = 175,777. Cash and cash equivalents at beginning of year, 2010-- = 27,642. Cash and Cash Equivalents at End of Year, 2012 = $\n78,442. Cash and Cash Equivalents at End of Year, 2011 -- = $ 91,092. Cash and Cash Equivalents at End of Year, 2010-- = $ 175,777. Supplemental Cash Flow Information, 2012 = . Supplemental Cash Flow Information, 2011 -- = . Supplemental Cash Flow Information, 2010-- = . Cash paid during the year for:, 2012 = . Cash paid during the year for:, 2011 -- = . Cash paid during the year for:, 2010-- = . Income taxes, 2012 = $ 53,463. Income taxes, 2011 -- = $ 47,251. Income taxes, 2010-- = $ 31,179. Interest, 2012 = 672. Interest, 2011 -- = 2,248. Interest, 2010-- = 5,195\nSee notes to consolidated financial statements.\n4\nApplied Industrial Technologies, Inc. and Subsidiaries\n17", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_AIT_2012.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "What is the price of the The Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", - "target_page": 8, - "target_passage": "£6.90", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Citation and commencement\n1. These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability Regulations 2014\n3. The Special Educational Needs and Disability Regulations 2014( c ) are amended as follows.\n4. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n5. After regulation 2 (interpretation) insert-", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014\n15. The Special Educational Needs (Personal Budgets) Regulations 2014( a ) are amended as follows.\n16. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n17. After regulation 2 (interpretation) insert-", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017\n28. The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017( a ) are amended as follows.\n29. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n30. After regulation 2 (interpretation) insert-", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n(b) regulation 7(1) and (4) (responding to social care recommendations).'.\nVicky Ford Parliamentary Under Secretary of State Department for Education\n28th April 2020\n( a ) S.I. 2017/1306.\n5", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", - "page_start": 90, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time period due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, the requirement for the local authority to review the making and use of direct payments within the first three months of them being made in regulation 11(2)(a) (monitoring and review of direct payments) is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n( a ) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.\n3\n(2) The coronavirus exception applies where it is not reasonably practicable for the local authority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the incidence or transmission of coronavirus.'.", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Consequential Amendments\n1. -(1) The Health Protection (Notification) Regulations 2010( a ) are amended as follows.\n(2) In regulation 4(3D)(b), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n( a ) S.I. 2010/659. Regulations 4(3D) and 4ZA were inserted by S.I. 2021/150. There are other amendments but none is relevant.\n88", - "page_start": 87, - "page_end": 87, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "When come into force the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", - "target_page": 1, - "target_passage": "These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Citation and commencement\n1. These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability Regulations 2014\n3. The Special Educational Needs and Disability Regulations 2014( c ) are amended as follows.\n4. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n5. After regulation 2 (interpretation) insert-", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017\n28. The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017( a ) are amended as follows.\n29. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n30. After regulation 2 (interpretation) insert-", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014\n15. The Special Educational Needs (Personal Budgets) Regulations 2014( a ) are amended as follows.\n16. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n17. After regulation 2 (interpretation) insert-", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n(b) regulation 7(1) and (4) (responding to social care recommendations).'.\nVicky Ford Parliamentary Under Secretary of State Department for Education\n28th April 2020\n( a ) S.I. 2017/1306.\n5", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", - "page_start": 90, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "' Relaxation of time period due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, the requirement for the local authority to review the making and use of direct payments within the first three months of them being made in regulation 11(2)(a) (monitoring and review of direct payments) is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n( a ) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.\n3\n(2) The coronavirus exception applies where it is not reasonably practicable for the local authority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the incidence or transmission of coronavirus.'.", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "EDUCATION, ENGLAND\nThe Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n28th April 2020\nLaid before Parliament\n30th April 2020\nComing into force\n-\n-\n1st May 2020\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by sections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) and 135(2) and (3) of the Children and Families Act 2014( a ) and sections 29(3) and 569(4) of the Education Act 1996( b ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "Who is Daniel Casali ?", - "target_page": 12, - "target_passage": " Daniel Casali is a Thought Leader Information Technology Specialist working for 15 years at IBM with Power Systems, high-performance computing, big data, and storage. His role at IBM is to bring to reality solutions that address client’s needs by exploring new technologies for different workloads. He is also fascinated by real multicloud implementations, always trying to abstract and simplify the new challenges of the heterogeneous architectures that are intrinsic to this new consumption model, be that on-premises or in the public cloud. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Daniel M. Wade\nDirector", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Daniel R. Henry\nChief Operating Officer", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Daniel R. Henry\nChief Operating Officer\nEuronet Services Inc.", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "HIGHLIGHTS/AWARDS:\nWWW.PAOLI.COM", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Glenn D. Bonner\nSenior Vice President Chief Information Officer\nDaniel J. D'Arrigo Senior Vice President Finance", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "A CASE STUDY IN EXPANDING MARKETS\nWith four brand names under the Hearth & Home Technologies umbrella, we are collectively the world's largest fireplace manufacturer, the country's premier fireplace brands, the most recognized name in the industry, and the preferred brands among home builders. As the leading provider of hearth and home products and services, we make houses feel more like homes.\nIn addition to our commanding leadership position in manufacturing the two strongest hearth and home product brand names - Heatilator ® and Heat-N-Glo ® - we also offer innovative wood fuel technology, fireplaces, and stoves through Quadra-Fire TM , while Fireside Hearth & Home distributes, services, and sells fireplace systems.\nWhat are we up to with all our great brands? We are meeting a broad range of customer needs, particularly by selling both to consumers and builders through a network of independent and company-owned, stand-alone, or gallerystyle design and installation centers. These Fireside Hearth & Home design centers - visually impressive and aspirational in setting - manifest our proprietary concept of elevating the hearth retail, installation, and distribution experience to a new level of sophistication and service. Since there is no other nationally branded hearth retailer in the industry, we are once again changing the game by being first-to-market innovators.\nOur newest store in Eagan, Minnesota, for example, is living proof that we're succeeding in growing core product share by getting closer to consumers. One customer, a St. Paul, Minnesota veterinarian, recently had a typically dynamic retail experience at the Eagan store. He's among a large group of people who own at least one of our hearth products - and who comes back for more. He explains: 'When we moved into our house, there were three fireplaces built into the family room, living room, and kitchen. Since we used them every day and liked them so much, we decided to convert our threeseason porch into a year-round porch.'", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems Volume 1\nDino Quintero\nRicardo Dobelin Barros\nDaniel Casali\nLuis Ferreira\nAlain Fisher\nFederico Fros\nLuis Daniel Gonzalez\nMiguel Gomez Gonzalez\nMahesh Gurugunti\nRogelio Rivera Gutierrez\nNicolas Joly\nBoris Litichevsky\nIsmael Solis Moreno\nGabriel Padilla\nSudipto Pal\nBogdan Savu\nRichard Wale\nIBM Redbooks\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nMarch 2020\nSG24-8459-00\nNote: Before using this information and the product it supports, read the information in 'Notices' on page vii.", - "page_start": 0, - "page_end": 3, - "source_file": "sg248459.pdf" - }, - { - "text": "THE HOMEOWNER AND HEARTH & HOME TECHNOLOGIES\nHearth & Home Technologies, you warm our hearts by making a powerful impact on our lives; you are the ones who transform our houses into homes. First, you warmed up our living rooms and family rooms with style, elegance, and comfort. Now, you're heating up our porches and our kitchens … and finding creative and innovative ways to make our bedrooms, bathrooms, dens, guest rooms, and kids' rooms all toasty with your beautiful glow. The home fires are burning brighter and hotter than ever, now that you've come into our lives.", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Modeling and controlling the body in maladaptive ways: an active inference perspective on non-suicidal self-injury behaviors\nBarca\nLaura\n*\n, Domenico Maisto, Giovani Pezzulo\nInstitute of Cognitive Sciences and Technologies, National Research Council, Via San Martino della Battaglia 44, Rome 00185, Italy *Corresponding author. Institute of Cognitive Sciences and Technologies, National Research Council, Via San Martino della Battaglia 44, Rome 00185, Italy. E-mail: laura.barca@istc.cnr.it", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "Brad D. Determan\nPresident,\nHearth and Home Technologies Inc.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "When does IBM close its acquisition of Red Hat ?", - "target_page": 20, - "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "1.2 Red Hat and IBM\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology.\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid cloud for your business. By combining the power and flexibility of Red Hat's open hybrid cloud technologies with the scale and depth of IBM innovation and industry expertise, you now have the tools to accelerate your cloud journey.\nIBM and Red Hat worked together for more than 20 years in making open source a competitive advantage for businesses on x86, IBM Power Systems, and IBM z Systemsfi. Together, we are both on a mission to improve open source technology and help your companies capture the business value of the cloud.\n4\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nThis publication describes how Red Hat and IBM can advance your cloud journey and speed growth and innovation for your business by using Red Hat OpenShift on IBM Power Systems.\nNote: Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of Red Hat's open source development heritage and unique development culture. Red Hat's unwavering commitment to open source remains unchanged and it continues to offer customers choice and flexibility.\nChapter 1. Introduction to the Journey to the Cloud: Volume 1\n5\n6\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nChapter 2.\n2", - "page_start": 19, - "page_end": 22, - "source_file": "sg248459.pdf" - }, - { - "text": "5. Enable Red Hat repositories for IBM POWER9:\nansible -i", - "page_start": 144, - "page_end": 144, - "source_file": "sg248459.pdf" - }, - { - "text": "6.2.4 Preparing the deployment host\nFor the configuration, you connect by way of SSH as root on the deployment host VM and complete the following steps:\n1. Configure the Red Hat Subscription Manager (RHSM) registration:\na. Register the host to RHSM:\nsubscription-manager register --username= --password= Registering to: subscription.rhsm.redhat.com:443/subscription The system has been registered with ID: e214ca01-fbed-43a0-aed5-d46150a5f912 The registered system name is: dplnode01.domain.example.com\nb. Identify the available OpenShift subscriptions:\nChapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC\n105\n106\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nsubscription-manager refresh All local data refreshed subscription-manager list --available --matches '*OpenShift*' Subscription Name: Red Hat OpenShift Container Platform for Power, LE Business Partner NFR, Self-Supported Provides: Red Hat Enterprise Linux for Power, little endian - Extended Update Support Red Hat Enterprise Linux Fast Datapath Beta for Power, little endian Red Hat Enterprise Linux for Power, little endian Red Hat Ansible Engine Red Hat OpenShift Enterprise Application Node Red Hat Enterprise Linux for Power 9 Red Hat Software Collections (for RHEL Server for IBM Power LE) Red Hat OpenShift Container Platform for Power Red Hat Software Collections Beta (for RHEL Server for IBM Power LE) RHEL for SAP HANA for Power, little endian - Extended Update Support Red Hat Beta Red Hat OpenShift Container Platform Client Tools for Power Red Hat Enterprise Linux Fast Datapath (for RHEL Server for IBM Power LE) RHEL for SAP for Power, little endian - Extended Update Support Red Hat Enterprise Linux for Power, little endian Beta Red Hat Container Native Virtualization Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support SKU: 111111111 Contract: 111111111 Pool ID: Provides Management: No Available: Unlimited Suggested: 1 Service Level: Standard Service Type: L1-L3 Subscription Type: Stackable Starts: 05/31/2019 Ends: 05/31/2020 System Type: Virtual", - "page_start": 120, - "page_end": 121, - "source_file": "sg248459.pdf" - }, - { - "text": "6.3.4 Installing the OpenShift Container Platform\n120\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nChapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC\n121\n122\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1", - "page_start": 135, - "page_end": 137, - "source_file": "sg248459.pdf" - }, - { - "text": "Help from IBM\nIBM Support and downloads\nibm.com /support\nIBM Global Services\nibm.com /services\n' Copyright IBM Corp. 2020. All rights reserved.\n249\n250\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n(0.2'spine) 0 . 17'<->0.473 ' 90<->249 p ages", - "page_start": 264, - "page_end": 266, - "source_file": "sg248459.pdf" - }, - { - "text": "13.Update the config.yaml file:\nChapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC\n157\n158\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n15.Deploy IBM Multicloud Manager:", - "page_start": 172, - "page_end": 173, - "source_file": "sg248459.pdf" - }, - { - "text": "1.1 Introduction\nMost companies started or are contemplating their journey to cloud. Although in recent years the adoption of cloud became much more common place, the scope of what a cloud is or can be also increased. This broadening of possibilities unfortunately added confusion and can result in companies being unsure of how their existing application estate can change to integrate with the cloud model.\nAs such, doubts still exist around how to start and progress on this journey. It is also true that although people understand traditional enterprise applications and more modern cloud-hosted applications, the integration or co-existence of both can prove equally confusing and contradicting.\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek to bring some clarity to the landscape while providing new modernization opportunities for existing enterprise applications and familiar environments.\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat OpenShift, which is hosted on IBM Power Systems. Although individually much can be written about either topic, the relationship this publication highlights is between Red Hat OpenShift and IBM Power Systems.\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically discuss how it can be deployed and added into existing familiar Power System environments, and the benefits that integration and co-existence can provide from an existing enterprise application viewpoint.\nThis publication is a first volume in a planned multi-volume publication over the next 12 - 18 months. Within this initial volume, we explain the fundamental perspective (which is accurate as of the time of this writing) while providing pointers to future direction that will be discussed in future volumes.\nNote: This initial publication relates to Red Hat OpenShift 3.11, because this release was the current OpenShift Container Platform (OCP) release for IBM Power Systems at the time of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM POWERfi to accelerate agility for enterprise clients through integrated tooling and a feature-rich Kubernetes container platform for cloud-native development on POWER9 and IBM POWER8fi processor-based servers.", - "page_start": 19, - "page_end": 19, - "source_file": "sg248459.pdf" - }, - { - "text": "Stay connected to IBM Redbooks\n/SM590000 Find us on Facebook:\nhttp://www.facebook.com/IBMRedbooks\n/SM590000 Follow us on Twitter:\nhttp://twitter.com/ibmredbooks\n/SM590000 Look for us on LinkedIn:\nhttp://www.linkedin.com/groups?home=&gid=2130806\n/SM590000 Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks weekly newsletter:\nhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm\n/SM590000 Stay current on recent Redbooks publications with RSS Feeds:\nhttp://www.redbooks.ibm.com/rss.html\nPreface\nxiii\nxiv\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nPart\n1", - "page_start": 14, - "page_end": 16, - "source_file": "sg248459.pdf" - }, - { - "text": "Red Hat OpenShift\nThis part introduces Red Hat OpenShift, provides an overview of the modular components and services, planning (for installation) considerations, preparing an environment, and deploying an OCP instance.\nThe following chapters are included in this part:\n/SM590000 Chapter 4, 'Red Hat OpenShift components and architecture' on page 59\n/SM590000 Chapter 5, 'Red Hat OpenShift installation planning and considerations' on page 71\n' Copyright IBM Corp. 2020. All rights reserved.\n57\n58\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nChapter 4.\n4", - "page_start": 72, - "page_end": 74, - "source_file": "sg248459.pdf" - }, - { - "text": "Part 4\n198\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nAppendix A.\nA", - "page_start": 213, - "page_end": 214, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "What does an ITMS service provide ?", - "target_page": 30, - "target_passage": "An IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Common patterns and corresponding AWS services\nQueue, AWS service = Amazon SQS. Event bus, AWS service = EventBridge. Publish/subscribe (fan-out), AWS service = Amazon SNS\nUse services instead of custom code\n19\nServerless\nDeveloper Guide\nOrchestration, AWS service = Step Functions. API, AWS service = API Gateway. Event streams, AWS service = Kinesis\nThese services are designed to integrate with Lambda and you can use infrastructure as code (IaC) to create and discard resources in the services. You can use any of these services via the AWS SDK without needing to install applications or configure servers. Becoming proficient with using these services via code in your Lambda functions is an important step to producing well-designed serverless applications.", - "page_start": 22, - "page_end": 23, - "source_file": "serverless-core.pdf" - }, - { - "text": "Call home\nCall home is a communication link that is established between a product and a service provider. The product can use this link to call IBM or another service provider when the product requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.", - "page_start": 791, - "page_end": 791, - "source_file": "sg247938.pdf" - }, - { - "text": "EXTENSIVE NETWORK\nBroadband Internet service is provided using the DOCSIS 3.0 standard which combines multiple RF channels onto one access into the customer premise, delivering exceptional performance. The bandwidth of our internet service offerings has increased 50 fold in the last 10 years as we bring new technology to market when it becomes available. This track record of investing in our networks and demonstrating the capability to deploy best in class service is one of our key strategies to ensure we stay competitive with other service providers that provide internet service into homes and business over copper facilities.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC.\n41\nM A NA G E M E N T ' S D I SCU S SI O N AN D ANAL Y S IS\nMANAGEMENT'S DISCUSSION AND ANALYSIS\nVoice-over-cable telephony services are provided over a dedicated DOCSIS network. Our offerings ensure a high quality of service by including network redundancy as well as network and customer premise backup powering. Our cable telephony service includes a rich set of features, such as TV Call Display, three-way calling and Home & Away™ voicemail that allows customers to be notified of and listen to their voicemail over MMS or the Web. In addition, we offer a wireless alternative to a fixed-line service.", - "page_start": 44, - "page_end": 45, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Services\nKubernetes Service is one more REST object and is similar to a pod. However, this service is designed as an abstraction for logical set of pods and associated policy to access those sets. This abstraction enables cloud-based applications to be decoupled from its endpoints. A Service definition is posted to API server to create a Service instance with or without Selector definition. Cloud native applications take advantage of the API server to query and discover Service endpoints, along with notification for changes in pods that are associated with a service.", - "page_start": 42, - "page_end": 42, - "source_file": "sg248459.pdf" - }, - { - "text": "Load Balancer as a Service (LBaaS)\nA service that provides the ability to distribute traffic among instances in a virtual private cloud.", - "page_start": 263, - "page_end": 263, - "source_file": "sg248459.pdf" - }, - { - "text": "Focusing on core serverless services\nAWS has over 220 services.\nEach service is a tool in your serverless development toolbox. Commonly, you start out using some services more frequently than others. This topic provides an overview of the core services you need to build serverless solutions.\nYou can read high level explanations of the core services here, and an example of how they interact within the context of an example microservice, or you can choose to skip ahead to the hands on workshop that uses three common services to build a working microservice.", - "page_start": 33, - "page_end": 33, - "source_file": "serverless-core.pdf" - }, - { - "text": "Reliance on Third Party S ervice Providers\nWe have outsourcing arrangements with third parties to provide certain essential components of our business operations to our employees and customers, including payroll, certain facilities or property management functions, call centre support, certain installation and service technicians, certain information technology functions, and invoice printing. Interruptions in these services can adversely affect our ability to service our customers.", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "What is Identity and Access Management?\nAWS provides and uses a service called Identity and Access Management (IAM) for authentication and authorization. IAM is used to manage developer accounts and secure the interaction between services and resources.\nIAM\n36", - "page_start": 39, - "page_end": 39, - "source_file": "serverless-core.pdf" - }, - { - "text": "Operations\nOur operations primarily consist of the collection, transfer and disposal of non-hazardous solid waste.\nCollection Services. We provide solid waste collection services to commercial, industrial, municipal and residential customers in 22 states through 140 collection companies. In 2004, 74.3% of our revenue was derived from collection services consisting of approximately 32.5% from services provided to municipal and residential customers, 36.6% from services provided to commercial customers, and 30.9% from services provided to industrial and other customers.\nOur residential collection operations involve the curbside collection of refuse from small containers into collection vehicles for transport to transfer stations or directly to landÑlls. Residential solid waste collection services are typically performed under contracts with municipalities, which we generally secure by competitive bid and which give our company exclusive rights to service all or a portion of the homes in their respective jurisdictions. These contracts or franchises usually range in duration from one to Ñve years, although some of our exclusive franchises are for signiÑcantly longer periods. Residential solid waste collection services may also be performed on a subscription basis, in which individual households contract directly with our company. The fees received for subscription residential collection are based primarily on market factors, frequency and type of service, the distance to the disposal facility and cost of disposal. In general, subscription residential collection fees are paid quarterly in advance by the residential customers receiving the service.\nIn our commercial and industrial collection operations, we supply our customers with waste containers of varying sizes. We also rent compactors to large waste generators. Commercial collection services are generally performed under one- to three-year service agreements, and fees are determined by such considerations as:\n, market factors,\n, collection frequency,\n, type of equipment furnished,\n, the type and volume or weight of the waste collected,\n, the distance to the disposal facility and\n, the cost of disposal.\nWe rent waste containers to construction sites and also provide waste collection services to industrial and construction facilities on a contractual basis with terms generally ranging from a single pickup to one year or longer. We collect the containers or compacted waste and transport the waste either to a landÑll or a transfer station for disposal.\nAlso, we currently provide recycling services in certain markets primarily to comply with local laws or obligations under our franchise agreements. These services include the curbside collection of residential recyclable waste and the provision of a variety of recycling services to commercial and industrial customers.\n7", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "NETWORK SERVICES\nEuronet's Network Services division provides complete solutions for management and outsourcing of distribution channels and transaction processing. These solutions include ATM networks, point-of-sale (POS) services and card management, as well as access to all major payment gateways and mobile operators.", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "What are the two distinct public domain tools support by Creative Commons ?", - "target_page": 1, - "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Creative Commons makes sharing easy", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Public Domain Mark\nUse this tool if you have identified a work that is free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "1. Introduction 1\nWe use 'commons' here in the sense of a resource that is broadly shared and accessible, and thus obviates the need for each individual actor to acquire, digitize, and format their own corpus of books for AI training. This resource could be collectively and intentionally managed, though we do not mean to select a particular form of governance in this paper. 4\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a books data commons as defined above and key questions relevant to developers, repositories, and other stakeholders, building on our workshop discussions. We first explain why books matter for AI training and how broader access could be beneficial. We then summarize two tracks that might be considered for developing such a resource, highlighting existing projects that help foreground both the potential and challenges. Finally, we present several key design choices, and next steps that could advance further development of this approach. 5\nIn this way, we do not use 'commons' in the narrow sense of permissively licensed. What's more, this 4 resource could also be governed as more of a data 'trust,' and, indeed, we discuss extensively the work of HathiTrust as a relevant project in this domain. However, our use of the word 'commons' is not meant to preclude this or other arrangements.\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all 5 e.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy of further analysis.\nTowards a Books Data Commons for AI Training\n2", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "What is Creative Commons ?", - "target_page": 1, - "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Creative Commons makes sharing easy", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Creative Commons\nPO Box 1866 Mountain View CA 94042 USA +1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "References\n' 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http: // creativecommons.org / licenses / by / 4.0 / ).", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed10.pdf" - }, - { - "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "4.3. Keep past and future separate\n28/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", - "page_start": 27, - "page_end": 27, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "How to apply the PDM to my work ?", - "target_page": 1, - "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "STEP 2 - FILL IN YOUR STUDENT DETAILS\nTo complete this section, you need to provide us with your personal details:", - "page_start": 22, - "page_end": 22, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "The CC0 Public Domain Dedication\nUse this universal tool if you are a holder of copyright or database rights, and wish to waive all your rights to the work worldwide.\nBy using CC0, you waive all copyright and related rights together with all associated claims and causes of action with respect to this work to the extent possible under the law.\nApplying CC0 to your work is easy. Simply visit the CC0 chooser (http://creativecommons.org/choose/zero) which will lead you through the process. When completed, you will be provided with HTML code that you can copy and paste into your website.\nYou let others copy, modify, distribute, and perform the work, even for commercial purposes, all without asking permission.\nWorks marked with the Public Domain Mark have been identified as being free of known restrictions under copyright law, including all related and neighboring rights. Anyone can copy, modify, distribute, and perform such works, even for commercial purposes, all without asking permission.\nApplying the PDM to a work is easy. Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.\nCreative Commons does not recommend this tool for works that are restricted by copyright laws in one or more jurisdictions. Consult with your legal advisor if you are unsure whether you should use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "A clear statement of your intention to resign.\nExample:\n'Please accept this letter as formal notice of my resignation from my post as Assistant IT Manager at XYZ.'", - "page_start": 48, - "page_end": 48, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "10.6 Submit inventory (PM)\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after being approved by the NFP (See section 10.5).", - "page_start": 41, - "page_end": 41, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "2.\nReference to your notice period (where applicable), as well as your last working day with the organisation.\nExample:\n'My last working day will be in two weeks' time, on 31 August 2015.'", - "page_start": 48, - "page_end": 48, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "10.6.1 Submit select tables for preparing the general submission\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the box under column 'Working inventory' (figure 68, a).\n*** Note: The selected inventory year to be submitted should be in status 'approved' (figure 68, b).\n5. Click on 'Work on Inventories' under Submission Management (figure 68, c).\nThis opens the Submit Inventory initial screen (figure 69).\n6. Click the inventory year to be submitted (figure 69, a).\n7. Press the 'Generate Official Submission' button (figure 69, c).\nFigure 69. Submit select tables for the preparation for the general submission\nFigure 68. View Inventories Progress screen - select inventory for the preparation for the general submission\nNAIIS-User-Manual.Docx\nPage 42\n10/02/2013\nOnce the 'Generate Official Submission' button has been pressed the 'Submit Inventory' initial screen for selecting the tables appears (figure 70).\n8. Select or deselect by clicking the appropriate year(s) under 'Inventory Years' box (figure 70, c) or the sector grids under the 'Table' box (figure 70, d) to generate the official submission.\n9. Press the 'Submit' button (figure 70, e). An official submission will be generated in the NAIIS system.\nFigure 70. Submit - select tables and grids for the general submission\nNAIIS-User-Manual.Docx\nPage 43\n10/02/2013", - "page_start": 41, - "page_end": 42, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.3 Send for checking (PM)\nOnce the SE's/or PM's have prepared the national GHG inventory, by entering data into the sectoral grids and the PM of the Party has checked the complete GHG inventory for consistency and correctness, the following steps allows the PM to send the inventory for checking:\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 58, a).\n5. Press the 'Send for Checking by NFP' button to send it to the NFP for his review and approval (figure 58, b). *** Note: A notification email will be sent to the NFP email address, and the status changed to 'check' (figure 59).\nFigure 58. Work on Inventories screen - Status = Started\nNAIIS-User-Manual.Docx\nPage 37\n10/02/2013", - "page_start": 36, - "page_end": 36, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "3.2.2.2 Add a new GHG inventory year or edit general properties/sectors (only NFP and PM's)\n Log in as NFP or PM.\n Click on 'Work on Inventories' under Submission Management (figure 10).\nFigure 11. Initial screen of 'Work on Inventories'\nOnce 'Work on Inventories' has been clicked, the initial screen will be displayed, which shows the following boxes (figure 11):\na. Existing Inventory (with all options)\nb. General properties - include the name, submission year, creator, creation date, status, updater and submission date\nc. Sectors\nd. Inventory years\nFollow the steps to add/remove an inventory year:\n Click on the inventory year (figure 12a)\n Select the inventory year under General properties (figure 12b)\n Select or deselect the appropriate Sectors (figure 12c)\n To add or remove an inventory year, select or deselect the relevant year under Inventory Years box (figure 12d)\nNAIIS-User-Manual.Docx\nPage 10\n10/02/2013", - "page_start": 9, - "page_end": 9, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.2 Start of inventory/submission (NFP or PM)\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year identified will be made available in the new inventory/submission.\nThese are the steps to start a new inventory:\n1. Click on 'View Inventories Progress' under sub menu 'Submission Management' (figure 53).\nFigure 53. View Inventories Progress sub menu\n2. The 'View Inventories Progress' screen appears (figure 54).\n3. Select the appropriate inventory by clicking the box under column 'Working Inventory' (figure 54, a).\n*** Note: The selected appropriate inventory should be in status 'created' (figure 54, b)\nNAIIS-User-Manual.Docx\nPage 35\n10/02/2013", - "page_start": 34, - "page_end": 34, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "16.3.2 Applying holds\nUsers can apply holds to a document or documents that are defined to an application group with the enabled Enhanced Retention Management feature. To apply a hold, select a document and click Actions → Holds → Apply Hold , as shown in Figure 16-8 on page 362.\nChapter 16. Enhanced Retention Management\n361\n362\nIBM Content Manager OnDemand Guide\nThis action prevents the deletion of documents in Content Manager OnDemand regardless of the documents' expiration dates.\nFigure 16-8 Highlighting and selecting documents to apply holds", - "page_start": 384, - "page_end": 385, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "Which rivers flow through Lyon?", - "target_page": 1, - "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Lyon [c] (Franco-Provençal: Liyon ) is the second-largest city in France by urban area and the third largest by city limits. [14] It is located at the confluence of the rivers Rhône and Saône, to the northwest of the French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km (36 mi) northeast of Saint-Étienne.\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census within its small municipal territory of 48 km 2 (19 sq mi), [15] but together with its suburbs and exurbs the Lyon metropolitan area had a population of 2,308,818 that same year, [7] the second most populated in France. Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16] Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of the Departmental Council of Rhône (whose jurisdiction, however, no longer extends over the Metropolis of Lyon since 2015).\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of an archbishopric whose holder bears the title of Primate of the Gauls. Lyon became a major economic hub during the Renaissance. The city is recognised for its cuisine and gastronomy, as well as historical and architectural landmarks; as such, the districts of Old Lyon, the Fourvière hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on the UNESCO World Heritage List. Lyon was historically an important area for the production and weaving of silk. Lyon played a significant role in the history of cinema since Auguste and Louis Lumière invented the cinematograph there. The city is also known for its light festival, the Fête des lumières, which begins every 8 December and lasts for four days, earning Lyon the title of \"Capital of Lights\".", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "References\n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde Lyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 50.htm) on 19 January 2011. Retrieved 3 April 2011.\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli sh_1). Chrd.lyon.fr . 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) on 24 January 2011. Retrieved 21 December 2017.\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. com/article/273644). Digitaljournal.com .\n35. (in French) Georges Duby (ed), Histoire de la France : Dynasties et révolutions, de 1348 à 1852 (vol. 2), Larousse, 1999 p. 53 ISBN 2-03-505047-2\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g etting-around/local-transport). Lonely Planet. Retrieved 2 February 2017.\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/). unesco.org . UNESCO World Heritage Centre. Retrieved 31 July 2015.", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Transport\nLyon-Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and international flights. It is a key transport facility for the entire Rhône-Alpes region, with coach links to other cities in the area. The in-house train station Gare de Lyon Saint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress tram monopoly links the airport with the business quarter of La Part Dieu in less than 30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4, and bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links the airport to Meyzieu [75] where passengers can change onto Tram T3. The regular price of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In the suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for domestic aviation.\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to accommodate the TGV, and Lyon Perrache, an older station that now provides mostly regional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul and Jean Macé. Lyon was the first city to be connected to Paris by the TGV in 1981. [76] Since that time the TGV train network has expanded and links Lyon directly to Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International trains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, Luxembourg, Brussels and London.\nThe city is at the heart of a dense road network and is located at the meeting point of several highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble. The city is now bypassed by the A46. A double motorway tunnel passes under Fourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du Soleil\".\nLyon 3: Berges du Rhône campus\nLyon 2: Berges du Rhône campus\nIPSA Lyon Campus\nPlatform I, Lyon-Part-Dieu train station\nT1 tramway on the Raymond Barre bridge", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Universities and tertiary education\nÉcole Centrale de Lyon;\nÉcole Normale Supérieure de Lyon\nEM Lyon (École de Management de Lyon);\nECE Lyon (École de Commerce Européenne de Lyon);\nInstitut d'études politiques de Lyon (Sciences Po Lyon);\nCPE Lyon;\nCNSMD (Conservatoire national supérieur de musique et de danse de Lyon)\nECAM Lyon (École Catholique d'Arts et Métiers de Lyon);\nEPITECH;\nEPITA;\nENTPE (École Nationale des Travaux Publiques de l'État);\nÉcole nationale vétérinaire de Lyon (ENVL);\nESME-Sudria;\nÉcole des Beaux-Arts;\nE-Artsup;\nINSA Lyon (Institut National des Sciences Appliquées de Lyon);\nPolytech Lyon;\nInstitut supérieur européen de gestion group;\nISARA (Institut Supérieur d'Agriculture Rhône Alpes);\nInstitution des Chartreux;\nInstitut polytechnique des sciences avancées;\nUniversité Claude Bernard (Lyon 1);\nUniversité Lumière (Lyon 2);\nUniversité Jean Moulin (Lyon 3);\nIAE (Institut d'Administration des Entreprises de Lyon);\nInstitut Sup'Biotech de Paris;\nCatholic University of Lyon;\nESDES Business School;\nIDRAC (International School of Management);\nWesford Graduate Business School;\nIFAG (Business Management School);\nInstitut supérieur européen de formation par l'action;\nLe Lycée du Parc;\nLa Martinière Lyon;\nWeb@cademie;\nCEESO (Centre Européen d'Enseignement Supérieur de l'Ostéopathie);\nForeign-born population in Lyon by country of birth [72]\nAlgeria, Country of birth = 14,779. Morocco, Country of birth = 5,245. Tunisia, Country of birth = 4,879. Italy, Country of birth = 3,351. Portugal, Country of birth = 3,068. Spain, Country of birth = 2,064. DR Congo, Country of birth = 1,520. China, Country of birth = 1,429. Cameroon, Country of birth = 1,364. Senegal, Country of birth = 1,198\nENS Lyon: René Descartes campus\nLyon 3: Manufacture des Tabacs campus\nBellecour, Écoles D'Arts.", - "page_start": 17, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Metropolis\nSince 2015, the commune of Lyon (48 km 2 (19 sq mi) in land area) and 58 suburban communes have formed the Metropolis of Lyon (534 km 2 (206 sq mi) in land area), a directly elected metropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only metropolitan authority in France which is a territorial collectivity, on par with French communes and departments. Its metropolitan council was for the first time directly elected by universal suffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in France.\nThe 14 electoral wards are the following (see map for location):\nLônes et coteaux\nLyon-Centre (Lyon-Centre)\nLyon-Est (Lyon-East)\nLyon-Nord (Lyon-North)\nLyon-Ouest\nLyon-Sud\nLyon-Sud-Est\nOuest\nPlateau Nord-Caluire\nPorte des Alpes\nPortes du Sud\nRhône Amont\nVal de Saône\nVilleurbanne\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is coterminous with the namesake commune. All other seven wards each group various suburban communes.\nMap of the Metropolis of Lyon and its 59 communes (the commune of Lyon is in red)\nThe division of the Metropolis of Lyon in large electoral wards often grouping various communes and dividing the commune of Lyon into six wards was criticized by the suburban mayors, as it ended the rule of 'one commune, one metropolitan councilor'. The goal of this electoral division of the metropolis was to focus metropolitan elections more on metropolitan issues than parochial communal issues, and ensure the 'one person, one vote' rule be respected, by creating electoral wards of more homogeneous population sizes. Opponents said it diluted the voice of the small suburban communes, which are now part of large electoral wards and do not each possess a representative in the metropolitan council anymore.", - "page_start": 8, - "page_end": 9, - "source_file": "wikipedia4.pdf" - }, - { - "text": "References\n53. UNESCO World Heritage Site (http://www.lyon.fr/vdl/sections/en/tourisme/copy_of_patrimoine/a_patrimoinem ondial) Archived (https://web.archive.org/web/20110718090826/http://www.lyon.fr/vdl/sections/en/Tourisme/co py_of_patrimoine/a_patrimoinemondial) 18 July 2011 at the Wayback Machine. City of Lyon official website. Retrieved 26 November 2009.\n54. Perret, Aurelie. \"Les traboules de Lyon\" (http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les -traboules-de-lyon.html). histoire-pour-tous.fr . SF Webmedia. Retrieved 31 July 2015.\n55. Curnonsky, Marcel E. Grancher (1935). Lyon, capitale mondiale de la gastronomie (https://books.google.com/ books?id=D481HQAACAAJ&q=curnonsky+lyon). Editions Lugdunum. Retrieved 30 July 2015.\n56. Buford, Bill (12 February 2011). \"Why Lyon is food capital of the world\" (https://www.theguardian.com/travel/2 011/feb/13/bill-buford-lyon-food-capital). The Guardian . Retrieved 11 December 2014.\n57. \"Priay Il y a 80 ans \" La mère Bourgeois \" obtenait 3 étoiles\" (http://www.leprogres.fr/ain/2013/01/09/priay-il-ya-80-ans-la-mere-bourgeois-obtenait-3-etoiles). leprogres.fr . Le Progres. Retrieved 30 July 2015.", - "page_start": 22, - "page_end": 23, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Economically, Lyon is a major centre for banking, chemical, pharmaceutical and biotech industries. The city contains a significant software industry with a particular focus on video games; in recent years it has fostered a growing local start-up sector. [17] The home of renowned universities and higher education schools, Lyon is the second-largest student city in France, with a university population of nearly 200,000 students within the Metropolis of Lyon. [18] Lyon hosts the international headquarters of Interpol, the International Agency for Research on Cancer, as well as Euronews. According to the Globalization and World Rankings Research Institute, Lyon is considered a Beta city, as of 2018. [19] It ranked second in France and 40th globally in Mercer's 2019 liveability rankings. [20]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\n1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 418,515. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1906. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 627,073. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.60%. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1968. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,077,794. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +2.17%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 427,522. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.43%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1911. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 629,931. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.09%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1975. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,153,402. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.98%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 426,552. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.04%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1921. 1872, Population of Lyon", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Sport\nLyon is home to the football club Olympique Lyonnais (OL), whose men's team plays in Ligue 1 and has won the championship of that competition seven times, all consecutively from 2002 to 2008. [63] OL played until December 2015 at the 43,000seat Stade de Gerland, which also hosted matches of the 1998 FIFA World Cup. Since 2016, the team has played at the Parc Olympique Lyonnais, a 59,000-seat stadium located in the eastern suburb of Décines-Charpieu. [64] OL operates a women's team, Olympique Lyonnais Féminin, which competes in and dominates Division 1 Féminine. They won fourteen consecutive top-flight championships (2007-2020), and additionally claim the four titles won by the original incarnation of FC Lyon, a\nParc Olympique Lyonnais\nwomen's football club that merged into OL in 2004 (the current FC Lyon was founded in 2009). The OL women have also won the UEFA Women's Champions League eight times, including in five consecutive editions from 2016 to 2020. Lyon hosted the 2019 FIFA Women's World Cup semi-finals as well as the Final on 7 July at Stade de Lyon.\nLyon has a rugby union team, Lyon OU, in the Top 14, which moved into Stade de Gerland full-time in 2017-18. In addition, Lyon has a rugby league side called Lyon Villeurbanne that plays in the French rugby league championship. The club's home is the Stade Georges Lyvet in Villeurbanne.\nLyon is also home to the Lyon Hockey Club, an ice hockey team that competes in France's national ice hockey league. The Patinoire Charlemagne is the seat of Club des Sports de Glace de Lyon, the club of Olympic ice dancing champions Marina Anissina and Gwendal Peizerat, and world champions Isabelle Delobel and Olivier Shoenfelder. [65] Lyon-Villeurbanne also has a basketball team, ASVEL, that plays at the Astroballe arena.", - "page_start": 15, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Modern Lyon\nFernand Braudel remarked, \"Historians of Lyon are not sufficiently aware of the bipolarity between Paris and Lyon, which is a constant structure in French development...from the late Middle Ages to the Industrial\nRevolution\". [31] In the late 15th century, the fairs introduced by Italian merchants made Lyon the economic counting house of France. Even the Bourse (treasury), built in 1749, resembled a public bazaar where accounts were settled in the open air. When international banking moved to Genoa, then Amsterdam, Lyon remained the banking centre of France.\nDuring the Renaissance, the city's development was driven by the silk trade, which strengthened its ties to Italy. Italian influence on Lyon's architecture is still visible among historic buildings. [32] In the late 1400s and 1500s Lyon was also a key centre of literary activity and book publishing, both of French writers (such as Maurice Scève, Antoine Heroet, and Louise Labé) and of Italians in exile (such as Luigi Alamanni and Gian Giorgio Trissino).\nIn 1572, Lyon was a scene of mass violence by Catholics against Protestant Huguenots in the St. Bartholomew's Day Massacre. Two centuries later, Lyon was again convulsed by violence during the French Revolution, when the citizenry rose up against the National Convention\n• Metro density\n500/km 2 (1,300/sq mi)\nTime zone\nUTC+01:00 (CET)\n• Summer (DST)\nUTC+02:00 (CEST)\nINSEE/Postal code\n69123 (https://www.inse e.fr/fr/statistiques/14055 99?geo=COM-69123) /69001-69009\nElevation\n162-349 m (531- 1,145 ft)\nWebsite\nlyon.fr (https://www.lyon. fr/)\n1 French Land Register data, which excludes lakes, ponds, glaciers > 1 km 2 (0.386 sq mi or 247 acres) and river estuaries.", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "How big was Lyon's population in 2022? ", - "target_page": 2, - "target_passage": "Population (2022) 520,774", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Lyon [c] (Franco-Provençal: Liyon ) is the second-largest city in France by urban area and the third largest by city limits. [14] It is located at the confluence of the rivers Rhône and Saône, to the northwest of the French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km (36 mi) northeast of Saint-Étienne.\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census within its small municipal territory of 48 km 2 (19 sq mi), [15] but together with its suburbs and exurbs the Lyon metropolitan area had a population of 2,308,818 that same year, [7] the second most populated in France. Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16] Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of the Departmental Council of Rhône (whose jurisdiction, however, no longer extends over the Metropolis of Lyon since 2015).\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of an archbishopric whose holder bears the title of Primate of the Gauls. Lyon became a major economic hub during the Renaissance. The city is recognised for its cuisine and gastronomy, as well as historical and architectural landmarks; as such, the districts of Old Lyon, the Fourvière hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on the UNESCO World Heritage List. Lyon was historically an important area for the production and weaving of silk. Lyon played a significant role in the history of cinema since Auguste and Louis Lumière invented the cinematograph there. The city is also known for its light festival, the Fête des lumières, which begins every 8 December and lasts for four days, earning Lyon the title of \"Capital of Lights\".", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\n1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 418,515. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1906. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 627,073. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.60%. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1968. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,077,794. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +2.17%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 427,522. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.43%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1911. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 629,931. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.09%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1975. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,153,402. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.98%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 426,552. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.04%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1921. 1872, Population of Lyon", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Ancient Lyon\nCountry, 1 = France. Region, 1 = Auvergne-Rhône-Alpes. Metropolis, 1 = Lyon Metropolis. Arrondissement, 1 = Lyon. Subdivisions, 1 = 9 arrondissements. Government, 1 = . · Mayor (2020-, 1 = Grégory Doucet [2]. 2026), 1 = (EELV). Area 1, 1 = 47.87 km 2 (18.48 sq mi). · Urban (2020 [3] ), 1 = 1,141.4 km 2 (440.7 sq mi). · Metro (2020 [4] ), 1 = 4,605.8 km 2. Population (2022) [5], 1 = 520,774. · Rank, 1 = 3rd in France. , 1 = 11,000/km 2. · Density, 1 = (28,000/sq mi). · Urban (Jan. [6], 1 = 1,702,921. 2021 ), 1 = . · Urban density, 1 = 1,500/km 2 (3,900/sq mi). · Metro (Jan., 1 = 2,308,818. 2021 [7] ), 1 = \nEarly Christians in Lyon were martyred for their beliefs under the reigns of various Roman emperors, most notably Marcus Aurelius and Septimius Severus. [28] Local saints from this period include Blandina, Pothinus, and Epipodius, among others. The Greek Irenaeus was the second bishop of Lyon during the latter part of the second century. [29] To this day, the archbishop of Lyon is still referred to as \" Primat des Gaules \". [30]\nBurgundians fleeing the destruction of Worms by the Huns in 437 were re-settled in eastern Gaul. In 443 the Romans established the Kingdom of the Burgundians, and Lugdunum became its capital in 461. In 843, under the Treaty of Verdun, Lyon went to the Holy Roman Emperor Lothair I. It later was made part of the Kingdom of Arles which was incorporated into the Holy Roman Empire in 1033. Lyon did not come\nThe Roman-era Theatre on the\nFourvière Hill\nunder French control until the 14th century.", - "page_start": 1, - "page_end": 2, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\n(59 communes, within 2020 borders).Pop. = 1,199,589. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.31%. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 527,621. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.47%. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1936. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 738,220. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.14%. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 2010. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,296,166. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.72%. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 566,115. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.46%. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1946. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 746,062. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.11%. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 2015. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,370,678. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.12%. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 600,881. 1896, Population of Lyon (metropolis)", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\n(metropolis) (59 communes, within 2020 borders).Pop. = 659,007. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.45%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1982. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,138,718. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.18%. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 453,540. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.37%. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1926. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 691,446. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.97%. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1990. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,166,797. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.30%. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 493,778. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.66%. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1931. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 743,297. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.46%. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1999. 1881, Population of Lyon (metropolis)", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\n(59 communes, within 2020 borders).±% p.a. = +1.21%. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1954. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 790,662. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.71%. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 2021. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,424,069. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.64%. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 608,856. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.26%. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1962. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 947,569. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +2.34%. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = . 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = . 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = \nStade de Gerland", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Economically, Lyon is a major centre for banking, chemical, pharmaceutical and biotech industries. The city contains a significant software industry with a particular focus on video games; in recent years it has fostered a growing local start-up sector. [17] The home of renowned universities and higher education schools, Lyon is the second-largest student city in France, with a university population of nearly 200,000 students within the Metropolis of Lyon. [18] Lyon hosts the international headquarters of Interpol, the International Agency for Research on Cancer, as well as Euronews. According to the Globalization and World Rankings Research Institute, Lyon is considered a Beta city, as of 2018. [19] It ranked second in France and 40th globally in Mercer's 2019 liveability rankings. [20]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\n±% p.a. = -0.03%. 1872, Year = . 1872, Pop. = . 1872, ±% p.a. = \nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are the redressed figures calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at the time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and remain the 2nd largest city of France ahead of Marseille). [68] The 1906 figure is the one published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate was smaller than 10,000. Source: EHESS [69] and INSEE [15]\nThe city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16]", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Population of Lyon (commune) (within 2020 borders)\nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the commune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at the time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and remain the 2nd largest city of France ahead of Marseille). [68] The 1906 figure is computed using the figure for the commune of Lyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate was smaller than 10,000.\nSource: EHESS [70] and INSEE [71]", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Demographics\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census. [15] As of 2011, 14% of its population was born outside Metropolitan France. [67]", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "What is the climate in Lyon ?", - "target_page": 5, - "target_passage": " Lyon has a humid subtropical climate ( Köppen: Cfa), bordering an oceanic climate (Köppen: Cfb, Trewartha: Do).", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Lyon [c] (Franco-Provençal: Liyon ) is the second-largest city in France by urban area and the third largest by city limits. [14] It is located at the confluence of the rivers Rhône and Saône, to the northwest of the French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km (36 mi) northeast of Saint-Étienne.\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census within its small municipal territory of 48 km 2 (19 sq mi), [15] but together with its suburbs and exurbs the Lyon metropolitan area had a population of 2,308,818 that same year, [7] the second most populated in France. Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16] Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of the Departmental Council of Rhône (whose jurisdiction, however, no longer extends over the Metropolis of Lyon since 2015).\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of an archbishopric whose holder bears the title of Primate of the Gauls. Lyon became a major economic hub during the Renaissance. The city is recognised for its cuisine and gastronomy, as well as historical and architectural landmarks; as such, the districts of Old Lyon, the Fourvière hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on the UNESCO World Heritage List. Lyon was historically an important area for the production and weaving of silk. Lyon played a significant role in the history of cinema since Auguste and Louis Lumière invented the cinematograph there. The city is also known for its light festival, the Fête des lumières, which begins every 8 December and lasts for four days, earning Lyon the title of \"Capital of Lights\".", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "References\n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde Lyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 50.htm) on 19 January 2011. Retrieved 3 April 2011.\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli sh_1). Chrd.lyon.fr . 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) on 24 January 2011. Retrieved 21 December 2017.\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. com/article/273644). Digitaljournal.com .\n35. (in French) Georges Duby (ed), Histoire de la France : Dynasties et révolutions, de 1348 à 1852 (vol. 2), Larousse, 1999 p. 53 ISBN 2-03-505047-2\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g etting-around/local-transport). Lonely Planet. Retrieved 2 February 2017.\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/). unesco.org . UNESCO World Heritage Centre. Retrieved 31 July 2015.", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Universities and tertiary education\nÉcole Centrale de Lyon;\nÉcole Normale Supérieure de Lyon\nEM Lyon (École de Management de Lyon);\nECE Lyon (École de Commerce Européenne de Lyon);\nInstitut d'études politiques de Lyon (Sciences Po Lyon);\nCPE Lyon;\nCNSMD (Conservatoire national supérieur de musique et de danse de Lyon)\nECAM Lyon (École Catholique d'Arts et Métiers de Lyon);\nEPITECH;\nEPITA;\nENTPE (École Nationale des Travaux Publiques de l'État);\nÉcole nationale vétérinaire de Lyon (ENVL);\nESME-Sudria;\nÉcole des Beaux-Arts;\nE-Artsup;\nINSA Lyon (Institut National des Sciences Appliquées de Lyon);\nPolytech Lyon;\nInstitut supérieur européen de gestion group;\nISARA (Institut Supérieur d'Agriculture Rhône Alpes);\nInstitution des Chartreux;\nInstitut polytechnique des sciences avancées;\nUniversité Claude Bernard (Lyon 1);\nUniversité Lumière (Lyon 2);\nUniversité Jean Moulin (Lyon 3);\nIAE (Institut d'Administration des Entreprises de Lyon);\nInstitut Sup'Biotech de Paris;\nCatholic University of Lyon;\nESDES Business School;\nIDRAC (International School of Management);\nWesford Graduate Business School;\nIFAG (Business Management School);\nInstitut supérieur européen de formation par l'action;\nLe Lycée du Parc;\nLa Martinière Lyon;\nWeb@cademie;\nCEESO (Centre Européen d'Enseignement Supérieur de l'Ostéopathie);\nForeign-born population in Lyon by country of birth [72]\nAlgeria, Country of birth = 14,779. Morocco, Country of birth = 5,245. Tunisia, Country of birth = 4,879. Italy, Country of birth = 3,351. Portugal, Country of birth = 3,068. Spain, Country of birth = 2,064. DR Congo, Country of birth = 1,520. China, Country of birth = 1,429. Cameroon, Country of birth = 1,364. Senegal, Country of birth = 1,198\nENS Lyon: René Descartes campus\nLyon 3: Manufacture des Tabacs campus\nBellecour, Écoles D'Arts.", - "page_start": 17, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Modern Lyon\nFernand Braudel remarked, \"Historians of Lyon are not sufficiently aware of the bipolarity between Paris and Lyon, which is a constant structure in French development...from the late Middle Ages to the Industrial\nRevolution\". [31] In the late 15th century, the fairs introduced by Italian merchants made Lyon the economic counting house of France. Even the Bourse (treasury), built in 1749, resembled a public bazaar where accounts were settled in the open air. When international banking moved to Genoa, then Amsterdam, Lyon remained the banking centre of France.\nDuring the Renaissance, the city's development was driven by the silk trade, which strengthened its ties to Italy. Italian influence on Lyon's architecture is still visible among historic buildings. [32] In the late 1400s and 1500s Lyon was also a key centre of literary activity and book publishing, both of French writers (such as Maurice Scève, Antoine Heroet, and Louise Labé) and of Italians in exile (such as Luigi Alamanni and Gian Giorgio Trissino).\nIn 1572, Lyon was a scene of mass violence by Catholics against Protestant Huguenots in the St. Bartholomew's Day Massacre. Two centuries later, Lyon was again convulsed by violence during the French Revolution, when the citizenry rose up against the National Convention\n• Metro density\n500/km 2 (1,300/sq mi)\nTime zone\nUTC+01:00 (CET)\n• Summer (DST)\nUTC+02:00 (CEST)\nINSEE/Postal code\n69123 (https://www.inse e.fr/fr/statistiques/14055 99?geo=COM-69123) /69001-69009\nElevation\n162-349 m (531- 1,145 ft)\nWebsite\nlyon.fr (https://www.lyon. fr/)\n1 French Land Register data, which excludes lakes, ponds, glaciers > 1 km 2 (0.386 sq mi or 247 acres) and river estuaries.", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Metropolis\nSince 2015, the commune of Lyon (48 km 2 (19 sq mi) in land area) and 58 suburban communes have formed the Metropolis of Lyon (534 km 2 (206 sq mi) in land area), a directly elected metropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only metropolitan authority in France which is a territorial collectivity, on par with French communes and departments. Its metropolitan council was for the first time directly elected by universal suffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in France.\nThe 14 electoral wards are the following (see map for location):\nLônes et coteaux\nLyon-Centre (Lyon-Centre)\nLyon-Est (Lyon-East)\nLyon-Nord (Lyon-North)\nLyon-Ouest\nLyon-Sud\nLyon-Sud-Est\nOuest\nPlateau Nord-Caluire\nPorte des Alpes\nPortes du Sud\nRhône Amont\nVal de Saône\nVilleurbanne\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is coterminous with the namesake commune. All other seven wards each group various suburban communes.\nMap of the Metropolis of Lyon and its 59 communes (the commune of Lyon is in red)\nThe division of the Metropolis of Lyon in large electoral wards often grouping various communes and dividing the commune of Lyon into six wards was criticized by the suburban mayors, as it ended the rule of 'one commune, one metropolitan councilor'. The goal of this electoral division of the metropolis was to focus metropolitan elections more on metropolitan issues than parochial communal issues, and ensure the 'one person, one vote' rule be respected, by creating electoral wards of more homogeneous population sizes. Opponents said it diluted the voice of the small suburban communes, which are now part of large electoral wards and do not each possess a representative in the metropolitan council anymore.", - "page_start": 8, - "page_end": 9, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Sport\nLyon is home to the football club Olympique Lyonnais (OL), whose men's team plays in Ligue 1 and has won the championship of that competition seven times, all consecutively from 2002 to 2008. [63] OL played until December 2015 at the 43,000seat Stade de Gerland, which also hosted matches of the 1998 FIFA World Cup. Since 2016, the team has played at the Parc Olympique Lyonnais, a 59,000-seat stadium located in the eastern suburb of Décines-Charpieu. [64] OL operates a women's team, Olympique Lyonnais Féminin, which competes in and dominates Division 1 Féminine. They won fourteen consecutive top-flight championships (2007-2020), and additionally claim the four titles won by the original incarnation of FC Lyon, a\nParc Olympique Lyonnais\nwomen's football club that merged into OL in 2004 (the current FC Lyon was founded in 2009). The OL women have also won the UEFA Women's Champions League eight times, including in five consecutive editions from 2016 to 2020. Lyon hosted the 2019 FIFA Women's World Cup semi-finals as well as the Final on 7 July at Stade de Lyon.\nLyon has a rugby union team, Lyon OU, in the Top 14, which moved into Stade de Gerland full-time in 2017-18. In addition, Lyon has a rugby league side called Lyon Villeurbanne that plays in the French rugby league championship. The club's home is the Stade Georges Lyvet in Villeurbanne.\nLyon is also home to the Lyon Hockey Club, an ice hockey team that competes in France's national ice hockey league. The Patinoire Charlemagne is the seat of Club des Sports de Glace de Lyon, the club of Olympic ice dancing champions Marina Anissina and Gwendal Peizerat, and world champions Isabelle Delobel and Olivier Shoenfelder. [65] Lyon-Villeurbanne also has a basketball team, ASVEL, that plays at the Astroballe arena.", - "page_start": 15, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Economically, Lyon is a major centre for banking, chemical, pharmaceutical and biotech industries. The city contains a significant software industry with a particular focus on video games; in recent years it has fostered a growing local start-up sector. [17] The home of renowned universities and higher education schools, Lyon is the second-largest student city in France, with a university population of nearly 200,000 students within the Metropolis of Lyon. [18] Lyon hosts the international headquarters of Interpol, the International Agency for Research on Cancer, as well as Euronews. According to the Globalization and World Rankings Research Institute, Lyon is considered a Beta city, as of 2018. [19] It ranked second in France and 40th globally in Mercer's 2019 liveability rankings. [20]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Climate\nLyon has a humid subtropical climate (Köppen: Cfa ), bordering an oceanic climate ( Köppen : Cfb , Trewartha: Do ). [38] The mean temperature in Lyon in the coldest month is 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). Precipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter months are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 August 2003 while the lowest recorded temperature was -24.6 °C (-12.3 °F) on 22 December 1938. [39]\nIce on the Saône, 2012", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Transport\nLyon-Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and international flights. It is a key transport facility for the entire Rhône-Alpes region, with coach links to other cities in the area. The in-house train station Gare de Lyon Saint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress tram monopoly links the airport with the business quarter of La Part Dieu in less than 30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4, and bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links the airport to Meyzieu [75] where passengers can change onto Tram T3. The regular price of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In the suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for domestic aviation.\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to accommodate the TGV, and Lyon Perrache, an older station that now provides mostly regional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul and Jean Macé. Lyon was the first city to be connected to Paris by the TGV in 1981. [76] Since that time the TGV train network has expanded and links Lyon directly to Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International trains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, Luxembourg, Brussels and London.\nThe city is at the heart of a dense road network and is located at the meeting point of several highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble. The city is now bypassed by the A46. A double motorway tunnel passes under Fourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du Soleil\".\nLyon 3: Berges du Rhône campus\nLyon 2: Berges du Rhône campus\nIPSA Lyon Campus\nPlatform I, Lyon-Part-Dieu train station\nT1 tramway on the Raymond Barre bridge", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "External links\nOfficial website (http://www.lyon.fr)(in French)\nVisit Lyon, the official website for tourism in France (https://en.visiterlyon.com/)\nLyon's English Language News and Information (https://thisislyon.fr/)\nRues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French)\nOld maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we b/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback Machine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive. org/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback Machine, The National Library of Israel\nRetrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\"", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": " What should do the rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided ?", - "target_page": 2, - "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Requirements about the keeping of registers of marriage services\n4. -(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1) must-\n(a) ensure that the register is kept in that church or chapel, and\n(b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1), the obligations under paragraph (1) in respect of that register fall on the churchwardens of the parish in which the church or chapel is situated.\nGiven under my hand on 29th April 2021\nAbi Tierney Registrar General\n2\nI approve\n29th April 2021\nKevin Foster Parliamentary Under Secretary of State Home Office", - "page_start": 1, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations provide for records of marriages to be kept in churches and chapels of the Church of England and the Church in Wales, other than chapels to which Part 5 of the Marriage Act 1949 applies (naval, military and air force chapels).\nRegulation 2 requires parochial church councils to provide books known as 'registers of marriage services' to churches and chapels in their parish in which banns of matrimony may be published, for the purposes of keeping the records required by regulation 3. Regulation 2 also imposes requirements relating to the durability and pre-printed content of these registers, and provides that they belong to the parochial church council.\nRegulation 3 requires specified information to be recorded in a register of marriage services when a marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of England or Church in Wales in a church or chapel in which banns of matrimony may be published. The record must be made and signed by the member of the clergy by whom the marriage was solemnized.\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services provided under regulation 2.\nA full impact assessment has not been produced for this instrument because no, or no significant, impact on the private, public or voluntary sector is foreseen.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nhttp://www.legislation.gov.uk/id/uksi/2021/538", - "page_start": 2, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Duty to record information about marriages solemnized according to the rites of the Church of England or Church in Wales\n3. -(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the rites of the Church of England in a church or chapel in which banns of matrimony may be published.\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the marriage was solemnized must make a record of the following information in relation to that marriage in a register of marriage services provided to the church or chapel under regulation 2(1)-\n(a) the date and place of the marriage;\n(b) the name and surname of each party;\n(c) the date of birth of each party;\n(d) the occupation (if any) of each party;\n(e) the address of each party at the time of the marriage;\n(f) the names and surnames of each party's parents, so far as those names and surnames are known to the clergyman who solemnized the marriage;\n(g) the name and surname of each of the witnesses in whose presence the marriage was solemnized;\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n(3) The clergyman must record the information required by paragraph (2) in English, and may also record information required by that paragraph in Welsh where the church or chapel is situated in Wales.\n(4) After making a record under paragraph (2) the clergyman must sign it.\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Citation, commencement, extent and interpretation\n1. -(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and Chapels) Regulations 2021.\n(2) These Regulations come into force on 4th May 2021.\n(3) These Regulations extend to England and Wales.\n(4) In these Regulations, 'chapel' does not include a chapel to which Part 5 of the Marriage Act 1949 (marriages in naval, military and air force chapels) applies( b ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Duty of parochial church councils to provide registers of marriage services\n2. -(1) The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England( c ) in that parish in which banns of matrimony may be published.\n(2) Books provided under paragraph (1) are to be known as 'registers of marriage services'.\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of paragraphs (4) and (5).\n(4) The register must be made of durable material.\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect of a marriage, the register must be printed in such a way that it-\n( a ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by paragraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently renumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic Storage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act 2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also inserted subsection (1A).\n( b ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to the Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n( c ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including references to the Church in Wales.\n(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of regulation 3(2) in relation to the marriage, and\n(b) provides corresponding spaces for recording information required by each of those subparagraphs in relation to the marriage.\n(6) A register of marriage services provided under paragraph (1) by a parochial church council belongs to that parochial church council.", - "page_start": 0, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "MARRIAGE, ENGLAND AND WALES\nThe Marriage (Keeping of Records in Churches and Chapels) Regulations 2021\nMade\n-\n-\n-\n-\n29th April 2021\nComing into force - -\n4th May 2021\nThe Registrar General makes these Regulations with the approval of the Secretary of State in exercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act 1949( a ).", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Piety and religion\nLouis was a pious and devout king who saw himself as the head and protector of the Catholic Church in France. He made his devotions daily regardless of where he was, following the liturgical calendar regularly. [107] Under the influence of his very religious second wife, he became much stronger in the practice of his Catholic faith. [108] This included banning opera and comedy performances during Lent. [108]\nTowards the middle and the end of his reign, the centre for the King's religious observances was usually the Chapelle Royale at Versailles. Ostentation was a distinguishing feature of daily Mass, annual celebrations, such as those of Holy Week, and special ceremonies. [109] Louis established the Paris Foreign Missions Society, but his informal alliance with the Ottoman Empire was criticised for undermining Christendom. [110]\nLouis XIV encouraged Catholic missions through the creation of the Paris Foreign Missions Society", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia5.pdf" - }, - { - "text": "17th and 18th centuries\nCity Hall on the Place des Terreaux, built by architects Jules Hardouin-Mansart and Robert de Cotte\nMusée des beaux-arts de Lyon, fine arts museum housed in a former convent of the 17th century, including the Baroque chapelle Saint-Pierre\nHôtel-Dieu de Lyon (17th and 18th century), historical hospital with a baroque chapel\nTemple du Change (17th and 18th century), former stock exchange of Lyon, Protestant temple since the 18th century\nPlace Bellecour, one of the largest town squares in Europe\nChapelle de la Trinité (1622), the first Baroque chapel built in Lyon, and part of the former École de la Trinité, now Collège-lycée Ampère\nÉglise Saint-Polycarpe (1665-1670), Classical church\nÉglise Saint-Just (16th to 18th century), Classical church\nSaint-Bruno des Chartreux (17th and 18th century), church, masterpiece of Baroque architecture\nÉglise Notre Dame Saint-Vincent (18th century), Neo-classical church\nBasilica of Saint-Martin d'Ainay\nSaint-Nizier Church\nÉglise Saint-Paul\nHôtel de Ville, Lyon\nMuseum of Fine Arts of Lyon\nHôtel-Dieu de Lyon\nPlace Bellecour\nÉglise Notre Dame Saint-Vincent\nTemple du Change\nChurch of Saint-Bruno des Chartreux", - "page_start": 10, - "page_end": 11, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Middle Ages and Renaissance\nCathedral of St. John, a medieval church with architectural elements of the 13th, 14th and 15th centuries, also the principal religious structure in the city and the seat of the Archbishop of Lyon\nBasilica of St-Martin-d'Ainay, one of the rare surviving Romanesque basilica-style churches in Lyon\nÉglise Saint-Paul, Romanesque (12th and 13th century) and Gothic (15th-16th century) church\nÉglise Saint-Bonaventure, 14th- and 15th-century Gothic church\nÉglise Saint-Nizier, Gothic church from the 15th century, having a doorway carved in the 16th century by Philibert Delorme\nVieux Lyon (English: Old Lyon) area, Medieval and Renaissance quarter of the town, with shops, dining and cobbled streets\nThe many Renaissance hôtels particuliers of the Old Lyon quarter, such as the Hôtel de Bullioud , were also built by Philibert Delorme\nMap showing the 14 electoral wards of the Metropolis of Lyon\nLyon Cathedral\nMaison du Crible (16th C.) in the Vieux Lyon\nÉglise Saint-Bonaventure\nChurch of Saint-Just, Lyon\nManécanterie, Lyon", - "page_start": 9, - "page_end": 10, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Use services instead of custom code\nServerless applications usually comprise several AWS services, integrated with custom code run in Lambda functions. While Lambda can be integrated with most AWS services, the services most commonly used in serverless applications are:", - "page_start": 22, - "page_end": 22, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "What are Tesla's total liabilities and equity in 2024?", - "target_page": 5, - "target_passage": "119,852", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Litigation Relating to 2018 CEO Performance Award\nOn June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of Chancery against Elon Musk and the members of Tesla's board of directors as then constituted, alleging corporate waste, unjust enrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan awarded to Elon Musk in 2018 (the '2018 CEO Performance Award'). Trial was held November 14-18, 2022. On January 30, 2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff's counsel filed a brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June 7, 2024, and a hearing was held on July 8, 2024. At Tesla's 2024 Annual Meeting of Stockholders, 72% of the disinterested voting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance Award. On June 28, 2024, because Tesla's disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. Musk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court's January 30, 2024 opinion, and a hearing was held on August 2, 2024.", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Consolidated Balance Sheets (in millions, except per share data)\nTable of Contents\n4,989. Other non-current assets, December 31, 2023 = 4,531. Total assets, September 30, 2024 = $ 119,852. Total assets, December 31, 2023 = $ 106,618. Liabilities, September 30, 2024 = . Liabilities, December 31, 2023 = . Current liabilities, September 30, 2024 = . Current liabilities, December 31, 2023 = . Accounts payable, September 30, 2024 = $ 14,654. Accounts payable, December 31, 2023 = $ 14,431. Accrued liabilities and other, September 30, 2024 = 10,601. Accrued liabilities and other, December 31, 2023 = 9,080. Deferred revenue, September 30, 2024 = 3,031. Deferred revenue, December 31, 2023 = 2,864. Current portion of debt and finance leases, September 30, 2024 = 2,291. Current portion of debt and finance leases, December 31, 2023 = 2,373. Total current liabilities, September 30, 2024 = 30,577. Total current liabilities, December 31, 2023 = 28,748. Debt and finance leases, net of current portion, September 30, 2024 = 5,405. Debt and finance leases, net of current portion, December 31, 2023 = 2,857. Deferred revenue, net of current portion, September 30, 2024 = 3,350. Deferred revenue, net of current portion, December 31, 2023 = 3,251. Other long-term liabilities, September 30, 2024 = 9,810. Other long-term liabilities, December 31, 2023 = 8,153. Total liabilities, September 30, 2024 = 49,142. Total liabilities, December 31, 2023 = 43,009. Commitments and contingencies (Note 10), September 30, 2024 = . Commitments and contingencies (Note 10), December 31, 2023 = . Redeemable noncontrolling interests in subsidiaries, September 30, 2024 = 70. Redeemable noncontrolling interests in subsidiaries, December 31, 2023 = 242. Equity, September 30, 2024 = . Equity, December 31, 2023 =", - "page_start": 4, - "page_end": 4, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Overview\nTesla, Inc. ('Tesla', the 'Company', 'we', 'us' or 'our') was incorporated in the State of Delaware on July 1, 2003 and converted to a Texas corporation on June 13, 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Note 11 - Variable Interest Entity Arrangements\nTable of Contents\nAssets, September 30, 2024 = . Assets, December 31, 2023 = . Current assets, September 30, 2024 = . Current assets, December 31, 2023 = . Cash and cash equivalents, September 30, 2024 = $ 51. Cash and cash equivalents, December 31, 2023 = $ 66. Accounts receivable, net, September 30, 2024 = 28. Accounts receivable, net, December 31, 2023 = 13. Prepaid expenses and other current assets, September 30, 2024 = 263. Prepaid expenses and other current assets, December 31, 2023 = 361. Total current assets, September 30, 2024 = 342. Total current assets, December 31, 2023 = 440. Operating lease vehicles, net, September 30, 2024 = 451. Operating lease vehicles, net, December 31, 2023 = -. Solar energy systems, net, September 30, 2024 = 2,524. Solar energy systems, net, December 31, 2023 = 3,278. Other non-current assets, September 30, 2024 = 190. Other non-current assets, December 31, 2023 = 369. Total assets, September 30, 2024 = $ 3,507. Total assets, December 31, 2023 = $ 4,087. Liabilities, September 30, 2024 = . Liabilities, December 31, 2023 = . Current liabilities, September 30, 2024 = . Current liabilities, December 31, 2023 = . Accrued liabilities and other, September 30, 2024 = $ 36. Accrued liabilities and other, December 31, 2023 = $ 67. Deferred revenue, September 30, 2024 = 7. Deferred revenue, December 31, 2023 = 6. Current portion of debt and finance leases, September 30, 2024 = 1,930. Current portion of debt and finance leases, December 31, 2023 = 1,564. Total current liabilities, September 30, 2024 = 1,973. Total current liabilities, December 31, 2023 = 1,637. Deferred revenue, net of current portion, September 30, 2024 = 81. Deferred revenue, net of current portion, December 31, 2023 = 99. Debt and finance leases, net of current portion, September 30, 2024 = 1,826.", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Consolidated Statements of Financial Position\nOther liabilities, 2024 = 2,292,045. Other liabilities, 2023 = 2,124,939. Total current liabilities, 2024 = 15,204,548. Total current liabilities, 2023 = 18,746,285. Lease liability, 2024 = -. Lease liability, 2023 = 405,748. Total liabilities, 2024 = $ 15,204,548. Total liabilities, 2023 = 19,152,033. Net assets:, 2024 = . Net assets:, 2023 = . Net assets without donor restrictions, 2024 = 265,859,067. Net assets without donor restrictions, 2023 = 249,088,663. Net assets with donor restrictions, 2024 = 5,696,323. Net assets with donor restrictions, 2023 = 5,882,673. Total net assets, 2024 = 271,555,390. Total net assets, 2023 = 254,971,336. Total liabilities and net assets, 2024 = $ 286,759,938. Total liabilities and net assets, 2023 = 274,123,369\nSee accompanying notes to consolidated financial statements.\n3", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Note 6 - Other Long-Term Liabilities\nOur other long-term liabilities consisted of the following (in millions):\nOperating lease liabilities, September 30, 2024 = $ 4,290. Operating lease liabilities, December 31, 2023 = $ 3,671. Accrued warranty reserve, September 30, 2024 = 4,524. Accrued warranty reserve, December 31, 2023 = 3,606. Other non-current liabilities, September 30, 2024 = 996. Other non-current liabilities, December 31, 2023 = 876. Total other long-term liabilities, September 30, 2024 = $ 9,810. Total other long-term liabilities, December 31, 2023 = $ 8,153", - "page_start": 23, - "page_end": 23, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Note 11 - Variable Interest Entity Arrangements\nTable of Contents\nDebt and finance leases, net of current portion, December 31, 2023 = 2,041. Total liabilities, September 30, 2024 = $ 3,880. Total liabilities, December 31, 2023 = $ 3,777", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Consolidated Statements of Financial Position\nCurrent assets:, 2024 = . Current assets:, 2023 = . Cash and cash equivalents, 2024 = $ 82,845,159. Cash and cash equivalents, 2023 = 75,808,401. Contributions receivable, 2024 = 856,657. Contributions receivable, 2023 = -. Short-term investments, 2024 = 116,074,763. Short-term investments, 2023 = 132,216,667. Prepaid expenses and other current assets, 2024 = 5,722,457. Prepaid expenses and other current assets, 2023 = 5,569,485. Total current assets, 2024 = 205,499,036. Total current assets, 2023 = 213,594,553. Restricted cash, 2024 = 1,428,542. Restricted cash, 2023 = 1,396,717. Long-term investments, 2024 = 67,291,224. Long-term investments, 2023 = 43,265,786. Right of use asset - operating lease, net, 2024 = -. Right of use asset - operating lease, net, 2023 = 1,821,174. Property and equipment, net, 2024 = 11,826,136. Property and equipment, net, 2023 = 14,045,139. Contributions receivable, 2024 = 715,000. Contributions receivable, 2023 = -. Total assets, 2024 = $ 286,759,938. Total assets, 2023 = 274,123,369. Liabilities and Net Assets, 2024 = . Liabilities and Net Assets, 2023 = . Current liabilities:, 2024 = . Current liabilities:, 2023 = . Accounts payable, 2024 = $ 4,009,582. Accounts payable, 2023 = 2,783,904. Accrued expenses, 2024 = 7,959,558. Accrued expenses, 2023 = 6,922,259. Lease liability, 2024 = 417,756. Lease liability, 2023 = 1,640,735. Donations payable to Wikimedia Endowment, 2024 = 525,607. Donations payable to Wikimedia Endowment, 2023 = 5,274,448.", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Note 5 - Accrued Liabilities and Other\nTable of Contents\nAccrued purchases (1), September 30, 2024 = $ 2,424. Accrued purchases (1), December 31, 2023 = $ 2,721. Accrued warranty reserve, current portion, September 30, 2024 = 1,839. Accrued warranty reserve, current portion, December 31, 2023 = 1,546. Payroll and related costs, September 30, 2024 = 1,513. Payroll and related costs, December 31, 2023 = 1,325. Taxes payable (2), September 30, 2024 = 1,265. Taxes payable (2), December 31, 2023 = 1,204. Customer deposits, September 30, 2024 = 994. Customer deposits, December 31, 2023 = 876. Operating lease liabilities, current portion, September 30, 2024 = 797. Operating lease liabilities, current portion, December 31, 2023 = 672. Sales return reserve, current portion, September 30, 2024 = 226. Sales return reserve, current portion, December 31, 2023 = 219. Other current liabilities, September 30, 2024 = 1,543. Other current liabilities, December 31, 2023 = 517. Total, September 30, 2024 = $ 10,601. Total, December 31, 2023 = $ 9,080", - "page_start": 23, - "page_end": 23, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Certain Derivative Lawsuits in Delaware\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by purported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly on behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly Twitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek unspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters into a single case, and a hearing on that motion is scheduled for November 18, 2024.", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "Where was Tesla incorporated? ", - "target_page": 13, - "target_passage": "State of Delaware", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Overview\nTesla, Inc. ('Tesla', the 'Company', 'we', 'us' or 'our') was incorporated in the State of Delaware on July 1, 2003 and converted to a Texas corporation on June 13, 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Other Litigation Related to Our Products and Services\nin San Diego County Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, 2024, the federal court granted Tesla's motion to transfer the case to the U.S. District Court for the Northern District of California. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the case pending arbitration.\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California against Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants made material misrepresentations and omissions about the Company's Autopilot and FSD Capability technologies and seeks money damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, 2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On November 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla's motion to dismiss without prejudice.\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern District of California. Several similar complaints were also filed in the same court and these cases have now all been consolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and maintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla compatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended complaint. On September 27, 2023, the court granted Tesla's motion to compel arbitration as to three of the plaintiffs, and on November 17, 2023, the court granted Tesla's motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second Amended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court's arbitration order, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla's motion to dismiss the Consolidated Second Amended Complaint.", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Litigation Relating to 2018 CEO Performance Award\nOn June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of Chancery against Elon Musk and the members of Tesla's board of directors as then constituted, alleging corporate waste, unjust enrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan awarded to Elon Musk in 2018 (the '2018 CEO Performance Award'). Trial was held November 14-18, 2022. On January 30, 2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff's counsel filed a brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June 7, 2024, and a hearing was held on July 8, 2024. At Tesla's 2024 Annual Meeting of Stockholders, 72% of the disinterested voting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance Award. On June 28, 2024, because Tesla's disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. Musk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court's January 30, 2024 opinion, and a hearing was held on August 2, 2024.", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Tesla, Inc.\n(Exact name of registrant as specified in its charter)\nTexas\n91-2197729\n(State or other jurisdiction of incorporation or organization)\n(I.R.S. Employer Identification No.)\n1 Tesla Road\nAustin, Texas\n78725\n(Address of principal executive offices)\n(Zip Code)", - "page_start": 0, - "page_end": 0, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Litigation Relating to Potential Going Private Transaction\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and Elon Musk in connection with Mr. Musk's August 7, 2018 Twitter post that he was considering taking Tesla private. On January 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of California and added as defendants the members of Tesla's board of directors. The consolidated complaint asserts claims for violations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of a class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, 2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a matter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, 2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals for the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.\nBetween October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, purportedly on behalf of Tesla, against Mr. Musk and the members of Tesla's board of directors, as constituted at relevant times, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits challenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have been stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the U.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla board of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in the above-referenced consolidated purported stockholder class action.\n21\n27 sur 49\n10/01/2025, 14:3\ntsla-20240930\nhttps://www.sec.gov/Archives/edgar/data/1318605/00016282802404..", - "page_start": 26, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Table of Contents\nOn October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla alleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the Company's 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company's corporate governance and internal procedures, unspecified damages, and attorneys' fees. The lawsuit has been stayed pending resolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below.\nOn November 15, 2021, JPMorgan Chase Bank ('JP Morgan') filed a lawsuit against Tesla in the Southern District of New York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In 2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk's August 7, 2018 Twitter post that he was considering taking Tesla private. Tesla disputed JP Morgan's adjustment as a violation of the parties' agreement. In 2021, Tesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed approximately $162 million as the value of additional shares that it claims should have been delivered as a result of the adjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the underlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 rather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. Tesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the stock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September 12, 2024, the Court denied JP Morgan's motion.", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Litigation and Investigations Relating to Alleged Discrimination and Harassment\nOn February 9, 2022, the California Civil Rights Department ('CRD,' formerly 'DFEH') filed a civil complaint against Tesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay equity claims, among others. CRD's amended complaint seeks monetary damages and injunctive relief. The case is currently in discovery. Trial is scheduled for September 15, 2025.\nAdditionally, on June 1, 2022 the Equal Employment Opportunity Commission ('EEOC') issued a cause finding against Tesla that closely parallels the CRD's allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the United States District Court for the Northern District of California asserting claims for race harassment and retaliation and seeking, among other things, monetary and injunctive relief.\nOn June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western District of Texas, purportedly on behalf of Tesla, against certain of Tesla's current and former directors. Both suits assert claims for breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and gender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified damages payable to Tesla, and attorneys' fees. On July 22, 2022, the Court consolidated the two cases and on September 6, 2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on September 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, 2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the defendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to amend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. Musk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.\n22\n28 sur 49\n10/01/2025, 14:3\ntsla-20240930", - "page_start": 27, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Other Litigation Related to Our Products and Services\nWe are also subject to various lawsuits that seek monetary and other injunctive relief. These lawsuits include proposed class actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our products and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related entities in the U.S. District Court for the Northern District of California, alleging various claims about the Company's driver assistance technology systems under state and federal law. This case was later consolidated with several other proposed class actions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on behalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a proposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state and federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to amend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8, 2024, the Court denied the plaintiff's motion for leave to file an amended complaint and entered judgment for Tesla. On September 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22, 2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order Tesla to (1) cease using the term 'Full Self-Driving Capability' (FSD Capability), (2) cease the sale and activation of FSD Capability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed courtfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30, 2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed the claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern District of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court granted in part and denied in part Tesla's motion. On October 2, 2023, a similar proposed class action was filed", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Certain Derivative Lawsuits in Delaware\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by purported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly on behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly Twitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek unspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters into a single case, and a hearing on that motion is scheduled for November 18, 2024.", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Litigation Related to Directors' Compensation\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery, purportedly on behalf of Tesla, against certain of Tesla's current and former directors regarding compensation awards granted to Tesla's directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and unjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their answer on September 17, 2020.\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve an admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and dismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to stockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which it took the settlement and plaintiff counsels' fee request under advisement. On August 14, 2024, the parties submitted a joint letter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a later date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial position.", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "What is the reason for the increase in Tesla's tax rate from 2023 to 2024?", - "target_page": 26, - "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "(5) Net Assets\nNet assets with donor restrictions at June 30, 2024 and 2023 are available for the following purposes:\nRestricted to future periods:, 2024 = $ 50,000. Restricted to future periods:, 2023 = 100,000. Restricted by purpose:, 2024 = . Restricted by purpose:, 2023 = . Abstract Wikipedia, 2024 = 861,008. Abstract Wikipedia, 2023 = 1,249,004. Artificial intelligence, 2024 = 239,878. Artificial intelligence, 2023 = -. Endowment support, 2024 = -. Endowment support, 2023 = 1,297,620. Future Audiences, 2024 = 500,000. Future Audiences, 2023 = -. Knowledge equity, 2024 = 965,910. Knowledge equity, 2023 = 2,228,134. Machine learning, 2024 = 24,528. Machine learning, 2023 = 860,620. Media Wiki, 2024 = 1,500,000. Media Wiki, 2023 = -. Other, 2024 = 125,000. Other, 2023 = 147,295. Restricted to future periods and by purpose:, 2024 = . Restricted to future periods and by purpose:, 2023 = . Artificial intelligence, 2024 = 1,430,000. Artificial intelligence, 2023 = -. Net assets with donor restrictions, 2024 = $ 5,696,324. Net assets with donor restrictions, 2023 = 5,782,673", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Article history:\nReceived 14 November 2023\nReceived in revised form 11 April 2024\nAccepted 25 May 2024\nAvailable online 15 August 2024", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" - }, - { - "text": "Litigation Relating to 2018 CEO Performance Award\nOn June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of Chancery against Elon Musk and the members of Tesla's board of directors as then constituted, alleging corporate waste, unjust enrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan awarded to Elon Musk in 2018 (the '2018 CEO Performance Award'). Trial was held November 14-18, 2022. On January 30, 2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff's counsel filed a brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June 7, 2024, and a hearing was held on July 8, 2024. At Tesla's 2024 Annual Meeting of Stockholders, 72% of the disinterested voting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance Award. On June 28, 2024, because Tesla's disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. Musk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court's January 30, 2024 opinion, and a hearing was held on August 2, 2024.", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "ISSUE\nDecember 2024", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "ISSUE\nDecember 2024", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Note 3 - Inventory\nTable of Contents\nRaw materials, September 30, 2024 = $ 5,555. Raw materials, December 31, 2023 = $ 5,390. Work in process, September 30, 2024 = 1,791. Work in process, December 31, 2023 = 2,016. Finished goods (1), September 30, 2024 = 5,950. Finished goods (1), December 31, 2023 = 5,049. Service parts, September 30, 2024 = 1,234. Service parts, December 31, 2023 = 1,171. Total, September 30, 2024 = $ 14,530. Total, December 31, 2023 = $ 13,626", - "page_start": 22, - "page_end": 22, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Note 5 - Accrued Liabilities and Other\nTable of Contents\nAccrued purchases (1), September 30, 2024 = $ 2,424. Accrued purchases (1), December 31, 2023 = $ 2,721. Accrued warranty reserve, current portion, September 30, 2024 = 1,839. Accrued warranty reserve, current portion, December 31, 2023 = 1,546. Payroll and related costs, September 30, 2024 = 1,513. Payroll and related costs, December 31, 2023 = 1,325. Taxes payable (2), September 30, 2024 = 1,265. Taxes payable (2), December 31, 2023 = 1,204. Customer deposits, September 30, 2024 = 994. Customer deposits, December 31, 2023 = 876. Operating lease liabilities, current portion, September 30, 2024 = 797. Operating lease liabilities, current portion, December 31, 2023 = 672. Sales return reserve, current portion, September 30, 2024 = 226. Sales return reserve, current portion, December 31, 2023 = 219. Other current liabilities, September 30, 2024 = 1,543. Other current liabilities, December 31, 2023 = 517. Total, September 30, 2024 = $ 10,601. Total, December 31, 2023 = $ 9,080", - "page_start": 23, - "page_end": 23, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Note 11 - Variable Interest Entity Arrangements\nTable of Contents\nAssets, September 30, 2024 = . Assets, December 31, 2023 = . Current assets, September 30, 2024 = . Current assets, December 31, 2023 = . Cash and cash equivalents, September 30, 2024 = $ 51. Cash and cash equivalents, December 31, 2023 = $ 66. Accounts receivable, net, September 30, 2024 = 28. Accounts receivable, net, December 31, 2023 = 13. Prepaid expenses and other current assets, September 30, 2024 = 263. Prepaid expenses and other current assets, December 31, 2023 = 361. Total current assets, September 30, 2024 = 342. Total current assets, December 31, 2023 = 440. Operating lease vehicles, net, September 30, 2024 = 451. Operating lease vehicles, net, December 31, 2023 = -. Solar energy systems, net, September 30, 2024 = 2,524. Solar energy systems, net, December 31, 2023 = 3,278. Other non-current assets, September 30, 2024 = 190. Other non-current assets, December 31, 2023 = 369. Total assets, September 30, 2024 = $ 3,507. Total assets, December 31, 2023 = $ 4,087. Liabilities, September 30, 2024 = . Liabilities, December 31, 2023 = . Current liabilities, September 30, 2024 = . Current liabilities, December 31, 2023 = . Accrued liabilities and other, September 30, 2024 = $ 36. Accrued liabilities and other, December 31, 2023 = $ 67. Deferred revenue, September 30, 2024 = 7. Deferred revenue, December 31, 2023 = 6. Current portion of debt and finance leases, September 30, 2024 = 1,930. Current portion of debt and finance leases, December 31, 2023 = 1,564. Total current liabilities, September 30, 2024 = 1,973. Total current liabilities, December 31, 2023 = 1,637. Deferred revenue, net of current portion, September 30, 2024 = 81. Deferred revenue, net of current portion, December 31, 2023 = 99. Debt and finance leases, net of current portion, September 30, 2024 = 1,826.", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Consolidated Statements of Financial Position\nCurrent assets:, 2024 = . Current assets:, 2023 = . Cash and cash equivalents, 2024 = $ 82,845,159. Cash and cash equivalents, 2023 = 75,808,401. Contributions receivable, 2024 = 856,657. Contributions receivable, 2023 = -. Short-term investments, 2024 = 116,074,763. Short-term investments, 2023 = 132,216,667. Prepaid expenses and other current assets, 2024 = 5,722,457. Prepaid expenses and other current assets, 2023 = 5,569,485. Total current assets, 2024 = 205,499,036. Total current assets, 2023 = 213,594,553. Restricted cash, 2024 = 1,428,542. Restricted cash, 2023 = 1,396,717. Long-term investments, 2024 = 67,291,224. Long-term investments, 2023 = 43,265,786. Right of use asset - operating lease, net, 2024 = -. Right of use asset - operating lease, net, 2023 = 1,821,174. Property and equipment, net, 2024 = 11,826,136. Property and equipment, net, 2023 = 14,045,139. Contributions receivable, 2024 = 715,000. Contributions receivable, 2023 = -. Total assets, 2024 = $ 286,759,938. Total assets, 2023 = 274,123,369. Liabilities and Net Assets, 2024 = . Liabilities and Net Assets, 2023 = . Current liabilities:, 2024 = . Current liabilities:, 2023 = . Accounts payable, 2024 = $ 4,009,582. Accounts payable, 2023 = 2,783,904. Accrued expenses, 2024 = 7,959,558. Accrued expenses, 2023 = 6,922,259. Lease liability, 2024 = 417,756. Lease liability, 2023 = 1,640,735. Donations payable to Wikimedia Endowment, 2024 = 525,607. Donations payable to Wikimedia Endowment, 2023 = 5,274,448.", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Table of Contents\nOur provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased by $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, 2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and increased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings.\nSee Note 9, Income Taxes , to the consolidated financial statements included elsewhere in this Quarterly Report on Form 10-Q for further details.", - "page_start": 42, - "page_end": 42, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "Which is the first candidate for experimenting the case of electrons interacting with a single boson mode?", - "target_page": 6, - "target_passage": "The primary candidate for such mode is an optical phonon", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "D. The collective boson model\nWe now turn to a more microscopic model- the CB model. The model describes fermions interacting by exchanging soft, overdamped collective bosons in a particular, near-critical, spin or charge channel 31,44,45 . This interaction is responsible for the normal state self-energy and also gives rise to a superconductivity. A peculiar feature of the CB model is that the propagator of a collective boson changes below T c because this boson is not an independent degree of freedom (as in EB model) but is made out of low-energy fermions which are affected by superconductivity 32 .\nThe most relevant point for our discussion is that this model contains the physics which we identified above as a source of a potential sign change of ∆ W K . Namely, at strong coupling the fermionic self-energy in the NS is large because there exists strong scattering between low-energy fermions mediated by low-energy collective bosons. In the SCS, the density of low-energy fermions drops and a continuum collective excitations becomes gaped. Both effects reduce fermionic damping and lead to the increase of W K in a SCS. If this increase exceeds a conventional loss of W K due to a gap opening, the total ∆ W K may become positive.\nThe CB model has been applied numerous times to the cuprates, most often under the assumption that nearcritical collective excitations are spin fluctuations with momenta near Q = ( π, π ). This version of a CB boson is commonly known as a spin-fermion model. This model yields d x 2 -y 2 superconductivity and explains in a quantitative way a number of measured electronic features of the cuprates, in particular the near-absence of the quasiparticle peak in the NS of optimally doped and underdoped cuprates 39 and the peak-dip-hump structure in the ARPES profile in the SCS 31,32,46,47 . In our analysis we assume that a CB is a spin fluctuation.\nThe results for the conductivity within a spin-fermion model depend in quantitative (but not qualitative) way on the assumption for the momentum dispersion of a collective boson. This momentum dependence comes from", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "B. The Einstein boson model\nWe next consider the case of electrons interacting with a single boson mode which by itself is not affected by superconductivity. The primary candidate for such mode is an optical phonon. The imaginary part of the NS self energy has been discussed numerous times in the literature. We make one simplifying assumption - approximate the DOS by a constant in calculating fermionic self-energy. We will, however, keep the full lattice dispersion in the calculations of the optical integral. The advantage of this\n6\nFIG. 5: The evolution of optical integral in NS(top) and SCS(bottom) for BCSI case. Plots are made for clean limit (solid lines, Γ = 3 . 5 meV ) and dirty limit (dashed lines, Γ = 150 meV ) for ∆ = 30 meV . Observe that (a) W (0) = 0 in the NS, but has a non-zero value in the SCS because of the δ -function (this value decreases in the dirty limit), and (b) the flat region in the SCS is due to the fact that σ ' ( ω ) = 0 for Ω < 2∆. Also note that ∼ 90 -95% of the spectral weight is recovered up to 1 eV\napproximation is that the self-energy can be computed analytically. The full self-energy obtained with the lattice dispersion is more involved and can only be obtained numerically, but its structure is quite similar to the one obtained with a constant DOS.\nThe self-energy for a constant DOS is given by\nΣ( iω ) = -i 2 π λ n ∫ d/epsilon1 k d ( i Ω) χ ( i Ω) G ( /epsilon1 k , iω + i Ω) (13)\nwhere\nχ ( i Ω) = ω 2 0 ω 2 0 -( i Ω) 2 (14)\nand λ n is a dimensionless electron-boson coupling. Integrating and transforming to real frequencies, we obtain\nΣ '' ( ω ) = -π 2 λ n ω o Θ( | ω | -ω o )\nIn the SCS, we obtain for ω < 0\nΣ ' ( ω ) = -1 2 λ n ω o log ∣ ∣ ∣ ∣ ω + ω o ω -ω o ∣ ∣ ∣ ∣ (15)", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0764.pdf" - }, - { - "text": "D. The collective boson model\nhigh-energy fermions and is an input for the low-energy theory. Below we follow Refs. 31,33 and assume that the momentum dependence of a collective boson is flat near ( π, π ). The self energy within such model has been worked out consistently in Ref. 31,33. In the normal state\nΣ '' ( ω ) = -1 2 λ n ω sf log ( 1 + ω 2 ω 2 sf ) ω (19)\nΣ ' ( ω ) = -λ n ω sf arctan ω sf\nwhere λ n is the spin-fermion coupling constant, and ω sf is a typical spin relaxation frequency of overdamped spin collective excitations with a propagator\nχ ( q ∼ Q, Ω) = χ Q 1 -i Ω ω sf (20)\nwhere χ Q is the uniform static susceptibility. If we use Ornstein-Zernike form of χ ( q ) and use either Eliashberg 45 or FLEX computational schemes 48 , we get rather similar behavior of Σ as a function of frequency and rather similar behavior of optical integrals.\nThe collective nature of spin fluctuations is reflected in the fact that the coupling λ and the bosonic frequency ω sf are related: λ scales as ξ 2 , where ξ is the bosonic mass (the distance to a bosonic instability), and ω sf ∝ ξ -2 (see Ref. 49). For a flat χ ( q ∼ Q ) the product λω sf does not depend on ξ and is the overall dimensional scale for boson-mediated interactions.\nIn the SCS fermionic excitations acquire a gap. This gap affects fermionic self-energy in two ways: directly, via the change of the dispersion of an intermediate boson in the exchange process involving a CB, and indirectly, via the change of the propagator of a CB. We remind ourselves that the dynamics of a CB comes from a particlehole bubble which is indeed affected by ∆.\nThe effect of a d -wave pairing gap on a CB has been discussed in a number of papers, most recently in 31 . In\n11\na SCS a gapless continuum described by Eq. (20) transforms into a gaped continuum, with a gap about 2∆ and a resonance at ω = ω 0 < 2∆, where for a d -wave gap we define ∆ as a maximum of a d -wave gap.", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" - }, - { - "text": "IV. SUMMARY\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal gauged U (1) B -L model. We have introduced a discrete Z 2 parity in the model, so that one RH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other two RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. No additional degrees of freedom are necessary to be added. We have evaluated the relic density of the dark matter particle. The dominant annihilation modes are via the Higgs boson exchange processes in the s -channel and thus, our model can be called Higgs portal DM model. It has been found that the relic density consistent with the current observation\n8\ncan be achieved only when the annihilation processes are enhanced by Higgs resonances. Therefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. We have also calculated the elastic scattering cross section between the DM particle and a proton and found it within the reach of future experiments for the direct DM search.", - "page_start": 7, - "page_end": 8, - "source_file": "1002.2525.pdf" - }, - { - "text": "I. INTRODUCTION\nFIG. 1: Schematic behavior of ∆ W vs ω c , Eq. (4). The limiting value of ∆ W at ω c = ∞ is ∆ W K given by Eq. (3) Depending on the value of ∆ W K , there can be either one sign change of ∆ W (panels a and c), or no sign changes (panel b), or two sign changes (panel d).\nIn our work, we perform direct numerical calculations of optical integrals at T = 0 for a lattice dispersion extracted from ARPES of the cuprates. The goal of our work is two-fold. First, we perform calculations of the optical integral in the NS and analyze how rapidly W ( ω c ) approaches W K , in other words we check how much of the Kubo sum is recovered up to the scale of the bandwidth. Second, we analyze the difference between optical\n3\nintegral in the SCS at T = 0 and in the NS extrapolated to T = 0 and compare the cut off effect ∆ f ( ω c ) to ∆ W K term. We also analyze the sign of ∆ W ( ω c ) at large frequencies and discuss under what conditions theoretical W ( ∞ ) increases in the SCS.\nWe perform calculations for four models. First is a conventional BCS model with impurities (BCSI model). Second is an Einstein boson (EB) model of fermions interacting with a single Einstein boson whose propagator does not change between NS and SCS. These two cases will illustrate a conventional idea of the spectral weight in SCS being less than in NS. Then we consider two more sophisticated models: a phenomenological 'marginal Fermi liquid with impurities' (MFLI) model of Norman and P'epin 30 , and a microscopic collective boson (CB) model 31 in which in the NS fermions interact with a gapless continuum of bosonic excitations, but in a d -wave SCS a gapless continuum splits into a resonance and a gaped continuum. This model describes, in particular, interaction of fermions with their own collective spin fluctuations 32 via\nΣ( k, Ω) = 3 g 2 ∫ dω 2 π d 2 q (2 π ) 2 χ ( q, ω ) G ( k + q, ω +Ω) (6)", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0764.pdf" - }, - { - "text": "I. INTRODUCTION\nThe nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model. The most attractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in which the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. The minimal gauged U (1) B -L model based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B -L [2] is an elegant and simple extension of the SM, in which the RH neutrinos of three generations are necessarily introduced because of the gauge and gravitational anomaly cancellations. In addition, the mass of RH neutrinos arises associated with the U (1) B -L gauge symmetry breaking.\nAlthough the scale of the B -L gauge symmetry breaking is basically arbitrary as long as phenomenological constraints are satisfied, one interesting option is to take it to be the TeV scale [3]. It has been recently pointed out [4] that when the classical conformal invariance is imposed on the minimal U (1) B -L model, the symmetry breaking scale appears to be the TeV scale naturally. If this is the case, all new particles, the Z ' gauge boson, the B -L Higgs boson H and the RH neutrinos appear at the TeV scale unless the U (1) B -L gauge coupling is extremely small, and they can be discovered at Large Hadron Collider [5-8]. Then we may be able to understand the relation between the gauge symmetry breaking and the origin of neutrino masses.", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" - }, - { - "text": "Optical Integral and Sum Rule Violation\nSaurabh Maiti, Andrey V. Chubukov\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n(Dated: November 9, 2018)\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in the cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting and normal states for 2-D systems with lattice dispersion typical of the cuprates for four different models - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a collective boson model with a feedback from superconductivity on a collective boson. The goal of the paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on the optical integral because in experiments W is measured up to frequencies of order bandwidth. For a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But for other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for ∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign of ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a negative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal state. The point of zero crossing, however, increases with the interaction strength and in a collective boson model becomes comparable to the bandwidth at strong coupling. We argue that this model exhibits the behavior consistent with that in the cuprates.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "I. INTRODUCTION\nAlthough such a TeV scale model is interesting and appealing, one might think that the absence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino with mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple idea to introduce the DM candidate in the minimal gauged U (1) B -L model. We introduce the Z 2 parity into the model and impose one of three RH neutrinos to be odd, while the others even. In this way, the Z 2 -odd RH neutrino becomes stable and the DM candidate. Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation data, with a prediction of one massless light neutrino. Therefore, without introducing any additional new dynamical degrees of freedom, the DM particle arises in the minimal gauged U (1) B -L model.\nThe paper is organized as follows. In the next section, we briefly describe our model. In section III, we estimate the thermal relic density of the RH neutrino and identify the model\n2\nparameter to be consistent with the current observations. We also calculate the scattering cross section between the DM particle and nucleon and discuss the implication for the direct DM search experiments. We summarize our results in the section IV. Our notations and the formulas used in our analysis are listed in Appendix.", - "page_start": 1, - "page_end": 2, - "source_file": "1002.2525.pdf" - }, - { - "text": "IV. GENERATE THE HIGH ORDER PHYSICAL SPIN INTERACTIONS BY PERTURBATIVE EXPANSION.\nOne major drawback of the present construction is that it involves high order interactions of physical spins[see (8) and (9)], thus is 'unnatural'. In this Section we will make compromises between exact solvability and naturalness. We consider two clusters j and k and try to generate the J x,y,z interactions in (7) from perturbation series expansion of more natural(lower order) physical spin interactions. Two different approaches for this purpose will be laid out in the following two Subsections. In Subsection IV A we will consider the two clusters as two tetrahedra, and couple the spin system to certain optical phonons, further coupling between the phonon modes\n5\nFIG. 3: Illustration of the tetragonal to orthorhombic Q E 1 (top) and Q E 2 (bottom) distortion modes. (a) Perspective view of the tetrahedron. 1 , . . . , 4 label the spins. Arrows indicate the motion of each spin under the distortion mode. (b) Top view of (a). (c)(d) Side view of (a).\nof the two clusters can generate at lowest order the desired high order spin interactions. In Subsection IV B we will introduce certain magnetic, e.g. Heisenberg-type, interactions between physical spins of different clusters, at lowest order(second order) of perturbation theory the desired high order spin interactions can be achieved. These approaches involve truncation errors in the perturbation series, thus the mapping to low energy effect Hamiltonian will no longer be exact. However the error introduced may be controlled by small expansion parameters. In this Section we denote the physical spins on cluster j ( k ) as j 1 , . . . , j 4 ( k 1 , . . . , k 4), and denote pseudo-spins on cluster j ( k ) as /vectorτ j ( /vectorτ k ).", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe briefly describe some of the properties of (8). Its low energy states are entirely in the space that each of the clusters is a physical spin singlet (called cluster singlet subspace hereafter). Therefore physical spin correlations are strictly confined within each cluster. The excitations carrying physical spin are gapped, and their dynamics are 'trivial' in the sense that they do not move from one cluster to another. But there are non-trivial low energy physical spin singlet excitations, described by the pseudospins defined above. The correlations of the pseudo-spins can be mapped to correlations of their corresponding physical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation becomes chirality-chirality correlation, or four-dimer correlation. It will be interesting to see the corresponding picture of the exotic excitations in the Kitaev model, e.g. the Majorana fermion and the Ising vortex. However this will be deferred to future studies.\nIt is tempting to call this as an exactly solved spin liquid with spin gap ( ∼ J cluster ), an extremely short-range resonating valence bond(RVB) state, from a model with spin rotation and time reversal symmetry. However it should be noted that the unit cell of this model contains an even number of spin-1/2 moments (so does the original Kitaev model) which does not satisfy the stringent definition of spin liquid requiring odd number of electrons per unit cell. Several parent Hamiltonians of spin liquids have already been constructed. See for example, Ref. 24-27 .", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "What was the optical integral analysis proposed by Norman and Pépin?", - "target_page": 8, - "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Optical platters\nWhen you work with optical platters, check and adjust the values for the following parameters in SYS1.PARMLIB(CBROAMxx) :\n/SM590000 MOUNTWAITTIME : Specifies the amount of time (in minutes) that can pass while a volume waits to be mounted on an operator-accessible drive within an optical library. After this time expires, message CBR4426D is issued to allow the operator to try again or to cancel the volume mount request. This value can be any numeric value 1 - 9999. If the operator retries the mount request, the value that is specified in the MOUNTWAITTIME parameter is used for the retry. The default value of this parameter is 5 minutes.\n/SM590000 OPTICALDISPATCHERDELAY : Specifies the number of seconds that the OAM optical dispatcher delays the processing of certain requests to minimize the flipping of optical disk cartridges in an automated optical storage library that expects that another read request for the currently mounted optical disk volume will arrive within this delay interval.\nThe OAM optical dispatcher delays processing of a unit of work for a specific period, when all of the following conditions are true:\n- A read request for an object on a currently mounted optical disk volume was completed.\n- No request exists for the currently mounted optical disk volume that is waiting to be processed on the OAM optical dispatcher queue.\n- The OAM optical dispatcher found a read request for another optical disk volume (either the opposite side of the currently mounted volume or an unmounted optical disk volume) and is about to dispatch this unit of work.\n- A nonzero optical dispatcher delay value is specified with the OPTICALDISPATCHERDELAY keyword on the SETOPT statement in the CBROAMxx PARMLIB member.\nIf another read request for the currently mounted optical disk volume arrives within the delay interval, that unit of work is dispatched immediately upon arrival. If no read request for the currently mounted optical disk volume arrives within the delay interval, another request for a different optical disk volume (either the opposite side of the currently mounted optical disk volume or an unmounted optical disk volume) is dispatched. Valid values for seconds are decimal numbers 1 - 60. If usage of this parameter is necessary, use of a low value, 1 - 5, is suggested.", - "page_start": 135, - "page_end": 136, - "source_file": "sg246915.pdf" - }, - { - "text": "C. Marginal Fermi liquid model\nFor their analysis of the optical integral, Norman and P'epin 30 introduced a phenomenological model for the self energy which fits normal state scattering rate measurements by ARPES 41 . It constructs the NS Σ '' ( ω ) out of two contributions - impurity scattering and electronelectron scattering which they approximated phenomenologically by the marginal Fermi liquid form of αω at small frequencies 6 (MFLI model). The total Σ '' is\nΣ '' ( ω ) = Γ + α | ω | f ( ω ω sat ) (17)\nwhere ω sat is about ∼ 1 2 of the bandwidth, and f ( x ) ≈ 1 for x < 1 and decreases for x > 1. In Ref 30 f ( x ) was assumed to scale as 1 /x at large x such that Σ '' is flat at large ω . The real part of Σ( ω ) is obtained from KramersKronig relations. For the superconducting state, they obtained Σ '' by cutting off the NS expression on the lower end at some frequency ω 1 (the analog of ω 0 +∆ that we had for EB model):\nΣ '' ( ω ) = (Γ + α | ω | )Θ( | ω | -ω 1 ) (18)\nwhere Θ( x ) is the step function. In reality, Σ '' which fits ARPESin the NS has some angular dependence along the Fermi surface 42 , but this was ignored for simplicity. This model had gained a lot of attention as it predicted the optical sum in the SCS to be larger than in the NS, i.e., ∆ W > 0 at large frequencies. This would be consistent with the experimental findings in Refs. 8,9 if, indeed, one identifies ∆ W measured up to 1eV with ∆ W K .\nWe will show below that the sign of ∆ W in the MFLI model actually depends on how the normal state results are extended to the superconducting state and, moreover, will argue that ∆ W K is actually negative if the extension is done such that at α = 0 the results are consistent with\n8\nBCSI model. However, before that, we show in Figs 1012 the conductivities and the optical integrals for the original MFLI model.\nω\nσ", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0764.pdf" - }, - { - "text": "I. INTRODUCTION\nThe analysis of the optical integral showed that in overdoped cuprates it definitely decreases below T c , in consistency with the expectations at weak coupling 11 . For underdoped cuprates, all experimental groups agree that a relative change of the optical integral below T c gets much smaller. There is no agreement yet about the sign of the change of the optical integral : Molegraaf et al. 8 and Santander-Syro et al. 9 argued that the optical integral increases below T c , while Boris et al. 10 argued that it decreases.\nTheoretical analysis of these results 21,22,25,28,30 added one more degree of complexity to the issue. It is tempting to analyze the temperature dependence of W K and relate it to the observed behavior of the optical integral, and some earlier works 25,28,30 followed this route. In the experiments, however, optical conductivity is integrated only up to a certain frequency ω c , and the quantity which is actually measured is\nW ( ω c ) = ∫ ω c 0 Reσ (Ω) d Ω = W K + f ( ω c ) f ( ω c ) = -∫ ' ∞ ' ω c Reσ (Ω) d Ω (4)\nThe Kubo formula, Eq. (3) is obtained assuming that the second part is negligible. This is not guaranteed, however, as typical ω c ∼ 1 -2 eV are comparable to the bandwidth.\nThe differential sum rule ∆ W is also a sum of two terms\n∆ W ( ω c ) = ∆ W K +∆ f ( ω c ) (5)\nwhere ∆ W K is the variation of the r.h.s. of Eq. 3, and ∆ f ( ω c ) is the variation of the cutoff term. Because conductivity changes with T at all frequencies, ∆ f ( ω c ) also varies with temperature. It then becomes the issue whether the experimentally observed ∆ W ( ω c ) is predominantly due to 'intrinsic' ∆ W K , or to ∆ f ( ω c ). [A third possibility is non-applicability of the Kubo formula because of the close proximity of other bands, but we will not dwell on this.]", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0764.pdf" - }, - { - "text": "Explanatory notes\ni. Some form of deep neural networks (without a specific learning algorithm) were described by: Warren S. McCulloch and Walter Pitts (1943) [115] Alan Turing (1948); [116] Karl Steinbuch and Roger David Joseph (1961). [117] Deep or recurrent networks that learned (or used gradient descent) were developed by: Frank Rosenblatt(1957); [116] Oliver Selfridge (1959); [117] Alexey Ivakhnenko and Valentin Lapa (1965); [118] Kaoru Nakano (1971); [119] Shun-Ichi Amari (1972); [119] John Joseph Hopfield (1982). [119] Precursors to backpropagation were developed by: Henry J. Kelley (1960); [116] Arthur E. Bryson (1962); [116] Stuart Dreyfus (1962); [116] Arthur E. Bryson and Yu-Chi Ho (1969); [116] Backpropagation was independently developed by: Seppo Linnainmaa (1970); [120] Paul Werbos (1974). [116]\nj. Geoffrey Hinton said, of his work on neural networks in the 1990s, \"our labeled datasets were thousands of times too small. [And] our computers were millions of times too slow.\" [121]\nk. In statistics, a bias is a systematic error or deviation from the correct value. But in the context of fairness, it refers to a tendency in favor or against a certain group or individual characteristic, usually in a way that is considered unfair or harmful. A statistically unbiased AI system that produces disparate outcomes for different demographic groups may thus be viewed as biased in the ethical sense. [219]\nl. Including Jon Kleinberg (Cornell University), Sendhil Mullainathan (University of Chicago), Cynthia Chouldechova (Carnegie Mellon) and Sam Corbett-Davis (Stanford) [228]\nm. Moritz Hardt (a director at the Max Planck Institute for Intelligent Systems) argues that machine learning \"is fundamentally the wrong tool for a lot of domains, where you're trying to design interventions and mechanisms that change the world.\" [233]\nn. When the law was passed in 2018, it still contained a form of this provision.", - "page_start": 28, - "page_end": 29, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Patrilineal descent\n1. Robert II of Worms and Rheingau (Robert of Hesbaye), 770-807\n2. Robert III of Worms and Rheingau, 808-834\n3. Robert IV the Strong, 820-866\n4. Robert I of France, 866-923\n5. Hugh the Great, 895-956\n6. Hugh Capet, 941-996\n7. Robert II of France, 972-1031\n8. Henry I of France, 1008-1060\n9. Philip I of France, 1053-1108\n10. Louis VI of France, 1081-1137\n11. Louis VII of France, 1120-1180\n12. Philip II of France, 1165-1223\n13. Louis VIII of France, 1187-1226\n14. Louis IX of France, 1214-1270\n15. Robert, Count of Clermont, 1256-1317\n16. Louis I, Duke of Bourbon, 1279-1342\n17. James I, Count of La Marche, 1319-1362\n18. John I, Count of La Marche, 1344-1393\n19. Louis, Count of Vendôme, 1376-1446\n20. Jean VIII, Count of Vendôme, 1428-1478\n21. François, Count of Vendôme, 1470-1495\n22. Charles de Bourbon, Duke of Vendôme, 1489-1537\n23. Antoine, King of Navarre, Duke of Vendôme, 1518-1562\n24. Henry IV, King of France and of Navarre, 1553-1610\n25. Louis XIII, King of France and Navarre, 1601-1643\n26. Louis XIV, King of France and Navarre, 1638-1715", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia5.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\nand. C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, Pros and cons Ontologies can be exported in = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = Term Extraction. C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, Ontology based-system = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, OLAF IN A PRACTICAL CONTEXT.Ontology = spaCy Doc objects. C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = . Embedding-based similar term extraction ConceptNet synonym extraction, Pros and cons Ontologies can be exported in = . Embedding-based similar term extraction ConceptNet synonym extraction, = Term Enrichment. Embedding-based similar term extraction ConceptNet synonym extraction, Ontology based-system = . Embedding-based similar term extraction ConceptNet synonym extraction, = library spaCy. Embedding-based similar term extraction ConceptNet synonym extraction, = . Embedding-based similar term extraction ConceptNet synonym extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = Our implementation is largely based on the work with data in staying flexible on the methods used. The only constraint is to end up with a list of. Embedding-based similar term extraction ConceptNet synonym extraction, = toolbox of methods we can Python NLP while .. WordNet synonym extraction, Pros and cons Ontologies can be exported in = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. WordNet synonym extraction, Ontology based-system = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. WordNet synonym extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. ConceptNet-based extraction Grouping terms based on synonyms, Pros and cons Ontologies can be exported in = . ConceptNet-based extraction Grouping terms based on synonyms,", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "Optical storage group\nOptical storage groups are used by Content Manager OnDemand to group sets of optical volumes for the storage of related data. Optical storage groups are used to group physical optical volumes and virtual optical volumes. Each optical storage group must contain only one type (physical or virtual). By using a specific storage group in the migration policy, the administrator can control the sets of reports that are stored on a particular set of optical volumes. Use IBM Navigator for i to define the optical storage group (Figure 5-19).\nFigure 5-19 Content Manager OnDemand for i optical storage group definition\nChapter 5. Storage management\n121\n122\nIBM Content Manager OnDemand Guide\nWhen you define the optical storage group, you provide the following information:\n/SM590000 Storage group name\n/SM590000 Description of the storage group\n/SM590000 Volume full reset when optical volumes are rewritable and you want to reuse the storage space (only available with local area network (LAN)-attached optical jukeboxes)\n/SM590000 Free space threshold percent (the percent at which Content Manager OnDemand starts storing to rewritable volumes again if the volume full reset parameter is checked)\n/SM590000 Storage group type, which is primary or backup\nAfter you define the optical storage group, use IBM Navigator for i to define the optical volumes to the Content Manager OnDemand system (Figure 5-20).\nFigure 5-20 Content Manager OnDemand for i optical volume definition\nWhen you define optical volumes, provide this information:", - "page_start": 144, - "page_end": 145, - "source_file": "sg246915.pdf" - }, - { - "text": "Optical Integral and Sum Rule Violation\nSaurabh Maiti, Andrey V. Chubukov\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n(Dated: November 9, 2018)\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in the cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting and normal states for 2-D systems with lattice dispersion typical of the cuprates for four different models - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a collective boson model with a feedback from superconductivity on a collective boson. The goal of the paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on the optical integral because in experiments W is measured up to frequencies of order bandwidth. For a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But for other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for ∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign of ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a negative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal state. The point of zero crossing, however, increases with the interaction strength and in a collective boson model becomes comparable to the bandwidth at strong coupling. We argue that this model exhibits the behavior consistent with that in the cuprates.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "The Linewidth of Ramsey Laser with Bad Cavity\ncus on the stimulated emission spectrum via multiple coherent interactions inside the cavity. We find this Ramsey laser can provide a stimulated-emission spectrum with a linewidth much narrower than that of any conventional optical Ramsey seperated-field spectroscopy, which is commonly applied in optical atomic clock. Our results also show that a subnatural linewidth spectroscopy, superior to any other available subnatural spectroscopy technique at present [3-10], can be reached by this kind of laser, if a suitable atomic level structure is chosen. Thus, this method can provide an e ff ective subnatural spectroscopy, and the possibilities for the new optical clock scheme [15] and atom interferometers [2].\nTheoretical framework: We consider the case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. All atoms are pumped onto the upper lasing state a before entering the first cavity of seperated field, and the lower lasing state is b . We assume all the atoms have the same velocities υ , that means what we consider here is a homogeneous laser system. And for the sake of simplicity, we consider the two-standing waves linear optical Ramsey configuration with a grid as spatial selector [20, 21]. Our treatment can be extended to other configurations as in [22-24]. The length of each oscillating part is l , and the length of the free drift region is L . The corresponding Hamiltonian is\nH = /planckover2pi1 ω ˆ a † ˆ a + /planckover2pi1 ∑ j [ ω j a ( t ) σ j a + ω j b ( t ) σ j b ] + /planckover2pi1 g ∑ j Γ j ( t )(ˆ a † ˆ σ j -e -i /vector k · /vector rj + ˆ σ j + ˆ ae i /vector k · /vector rj ) , (1)", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe shape of the individual occultation steps depends on energy and occultation angle. Transmission as a function of time is modeled as T ( t ) = exp [ -µ ( E ) A ( h )], where µ ( E ) is the mass attenuation coefficient of gamma rays at energy E in air and A ( h ) is the air mass along the line of sight at a given altitude h ( t ). Account is taken of the detector response as it changes as a function of angle across the fit window. For each source, occultation times are predicted. Each step is fit over a 4-minute window along with a quadratic background and using an assumed spectrum to determine the detector count rate due to the source. The instrument response is used to convert the count rate to a flux. Up to 31 steps are possible for a given source in a day, and these steps are summed to get a single daily average flux. The GBM occultation sensitivity exceeds that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV [5].\nThis work uses the GBM CTIME data, with its 8 broad energy channels and 0.256-second resolution, rebinned to 2-second resolution. The occultation technique relies on an input catalog of known sources. Currently, we are monitoring 64 sources. Of these 64 sources, 6 steady sources are detected above 100 keV with a significance of at least 5 σ after ∼ 490 days of observations, and one transient source.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "What is the Ferrel-Glover-Tinkham sum rule?", - "target_page": 1, - "target_passage": "the redistribution of the spectral weight between normal and superconducting state", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Query\nFigure 9: Extracts of SummEvalFr dataset.\nHuman summary, Original (SummEval) Translated (Sum- = mEvalFr) The whale, Varvara, swam a round trip from Russia to Mexico, nearly 14,000 miles. La baleine, Varvara, a parcouru à la nage un trajet aller-retour entre la Russie. Machine summary, Original (SummEval) Translated (Sum- = avait migré sur plus de 10 000 miles. north pacific gray whale has earned a spot la baleine grise du paci- fique nord a. Machine summary, Original (SummEval) Translated (Sum- = in the record for the longest obtenu une place dans le. Machine summary, Original (SummEval) Translated (Sum- = migration of a mammal ever recorded . the whale , named record de la plus longue migration d'un mammifère. Machine summary, Original (SummEval) Translated (Sum- = varvara , swam nearly 14,000 miles from the guinness jamais en- registrée. la baleine, nom- mée varvara,. Machine summary, Original (SummEval) Translated (Sum- = worlds records . the record was set by a whale whale whale that swam a mere a nagé près de 14 000 miles depuis les records du monde guinness. le. Machine summary, Original (SummEval) Translated (Sum- = 10,190-mile record a été", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv4.pdf" - }, - { - "text": "I. INTRODUCTION\nThe analysis of sum rules for optical conductivity has a long history. Kubo, in an extensive paper 1 in 1957, used a general formalism of a statistical theory of irreversible processes to investigate the behavior of the conductivity in electronic systems. For a system of interacting electrons, he derived the expression for the integral of the real part of a (complex) electric conductivity σ (Ω) and found that it is independent on the nature of the interactions and reduces to\n∫ ∞ 0 Reσ (Ω) d Ω = π 2 ne 2 m (1)\nHere n is the density of the electrons in the system and m is the bare mass of the electron. This expression is exact provided that the integration extends truly up to infinity, and its derivation uses the obvious fact that at energies higher than the total bandwidth of a solid, electrons behave as free particles.\nThe independence of the r.h.s. of Eq. (1) on temperature and the state of a solid (e.g., a normal or a superconducting state - henceforth referred to as NS and SCS respectively) implies that, while the functional form of σ (Ω) changes with, e.g., temperature, the total spectral weight is conserved and only gets redistributed between different frequencies as temperature changes. This conservation of the total weight of σ (Ω) is generally called a sum rule.\nOne particular case, studied in detail for conventional superconductors, is the redistribution of the spectral weight between normal and superconducting states. This is known as Ferrel-Glover-Tinkham (FGT) sum rule: 2,3\n∫ ∞ 0+ Reσ NS (Ω) = ∫ ∞ 0+ Reσ sc (Ω) + πn s e 2 2 m (2)\nwhere n s is the superfluid density, and πn s e 2 / (2 m ) is\nthe spectral weight under the δ -functional piece of the conductivity in the superconducting state.\nIn practice, the integration up to an infinite frequency is hardly possible, and more relevant issue for practical applications is whether a sum rule is satisfied, at least approximately, for a situation when there is a single electron band which crosses the Fermi level and is well separated from other bands. Kubo considered this case in the same paper of 1957 and derived the expression for the 'band', or Kubo sum rule", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "=SUM(B10:D15)\nAs you can see this is much simpler than writing your own referential formula which would look like:", - "page_start": 29, - "page_end": 29, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "3.1.3 SummEvalFr (Summarization)\nTable 2: Average ROUGE and BLUE scores computed between machine summaries and human summaries for the original English SummEval and its translation to French. The correlations of the individual scores between English and French are also reported.\nSummEval, BLEU = 0.205. SummEval, ROUGE-1 = 0.292. SummEval, ROUGE-2 = 0.099. SummEval, ROUGE-L = 0.193. SummEvalFr, BLEU = 0.276. SummEvalFr, ROUGE-1 = 0.302. SummEvalFr, ROUGE-2 = 0.117. SummEvalFr, ROUGE-L = 0.194. Correlation En-Fr, BLEU = 0.70. Correlation En-Fr, ROUGE-1 = 0.85. Correlation En-Fr, ROUGE-2 = 0.80. Correlation En-Fr, ROUGE-L = 0.84", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "Query\n· Summarization: Spearman correlation based on cosine similarity", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv4.pdf" - }, - { - "text": "Acknowledgements\n1 R. Kubo, J. Phys. Soc. Jpn 12 , 570(1957).\n2 R.A. Ferrrel and R.E. Glover, Phys. Rev. 109 , 1398 (1958).\n3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2 , 331 (1959), M. Tinkham, Introduction to Superconductivity (McGraw-Hill, New York, 1975).\n4 J. Hirsch, Physica C 199 , 305 (1992).\n5 D. N. Basov and T. Timusk, Rev. Mod. Phys. 77 , 721 (2005); A. V. Puchkov, D. N. Basov and T. Timusk, J. Phys. Cond. Matter 8 , 10049 (1996).\n6 C. M. Varma et al , Phys. Rev. Lett. 63 , 1996 (1989).\n7 D. N. Basov, S. I. Woods, A. S. Katz, E. J. Singley, R. C. Dynes, M. Xu, D. G. Hinks, C. C. Homes and M. Strongin, Science 283 , 49 (1999).\n8 H.J.A Molegraaf, C. Presura, D. van der Marel, P.H. Kess, M. Li, Science 295 , 2239 (2002); A. B. Kuzmenko, H. J. A. Molegraaf, F. Carbone and D. van der Marel, Phys. Rev. B 72 , 144503 (2005).\n9 A. F. Santander-Syro, R. P. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li and H. Raffy, Europhys. Lett. 62 , 568 (2003);\n10 A. V. Boris, N. N. Kovaleva, O. V. Dolgov, T. Holden, C. T. Lin, B. Keimer and C. Bernhard, Science 304 , 708 (2004).", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFigure 2(a)-(c) shows the magnetic field dependence of XMCD asymmetry, defined as ( I l -I r ) / ( I l + I r ) where I l ( r ) is the absorption for left- (right-) circularly polarized x-rays. This is measured at the Fe and Mn L 3 absorption peaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. The external field is applied along the photon incidence direction, which is at 70 · to the surface normal with an in-plane projection along the [110] axis. The XMCD data show that the Fe film displays a square hysteresis loop with a single magnetization switch, as expected for a monocrystalline Fe film with strong uniaxial magnetic anisotropy. The Mn XMCD shows a more complicated loop due to the effect of the interlayer coupling. The projected Mn moment aligns antiparallel to the Fe moment at remanence, and undergoes a magnetization reversal of opposite sign to the Fe. With further increase of the external magnetic field, the Mn moment gradually rotates away from antiparallel alignment with the Fe layer, and into the field direction. Qualitatively similar behavior is observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sample: the (Ga,Mn)As layer is aligned antiparallel to the Fe layer at zero field, although the bias field is lower by approximately a factor of two.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "Investor Inquiries\ninvestorrelations@killamproperties.com 902.442.0388", - "page_start": 96, - "page_end": 96, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "References\nMichael Glass, Alfio Gliozzo, Rishav Chakravarti, Anthony Ferritto, Lin Pan, G P Shrivatsa Bhargav, Dinesh Garg, and Avi Sil. 2020. Span Selection Pre-training for Question Answering. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics , pages 2773-2782, Online. Association for Computational Linguistics.\nGoran Glavaš and Ivan Vuli'c. 2020. Is Supervised Syntactic Parsing Beneficial for Language Understanding? An Empirical Investigation. arXiv:2008.06788 [cs] .\nAdele Goldberg. 2006. Constructions at Work: The Nature of Generalization in Language . Oxford University Press, USA.\nYoav Goldberg. 2019. Assessing BERT's syntactic abilities. arXiv preprint arXiv:1901.05287 .\nLinyuan Gong, Di He, Zhuohan Li, Tao Qin, Liwei Wang, and Tieyan Liu. 2019. Efficient training of BERT by progressively stacking. In International Conference on Machine Learning , pages 2337-2346.\nMitchell A Gordon, Kevin Duh, and Nicholas Andrews. 2020. Compressing BERT: Studying the effects of weight pruning on transfer learning. arXiv preprint arXiv:2002.08307 .\nSaurabh Goyal, Anamitra Roy Choudhary, Venkatesan Chakaravarthy, Saurabh ManishRaje, Yogish Sabharwal, and Ashish Verma. 2020. Powerbert: Accelerating BERT inference for classification tasks. arXiv preprint arXiv:2001.08950 .\nFu-Ming Guo, Sijia Liu, Finlay S. Mungall, Xue Lin, and Yanzhi Wang. 2019. Reweighted Proximal Pruning for Large-Scale Language Representation. arXiv:1909.12486 [cs, stat] .\nKelvin Guu, Kenton Lee, Zora Tung, Panupong Pasupat, and Ming-Wei Chang. 2020. REALM: Retrieval-Augmented Language Model PreTraining. arXiv:2002.08909 [cs] .", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFerromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material. The realization of spin-valve devices from FM semiconductors requires the controlled switching of magnetization in adjacent layers between antiferromagnetic (AFM) and FM configurations. This has motivated several theoretical investigations of interlayer coupling in all-semiconductor devices 1 , and AFM coupling has recently been demonstrated in (Ga,Mn)As multilayers separated by p -type non-magnetic spacers 2 . However, the Curie temperature T C of (Ga,Mn)As is currently limited to 185 K in single layers 3 , and is typically much lower for layers embedded within a heterostructure 2 , which is an obstacle to the practical implementation of semiconductor spintronics.\nThe development of FM metal/FM semiconductor heterostructures has the potential to bring together the benefits of metal and semiconductor based spintronics, offering access to new functionalities and physical phenomena. Recent studies of MnAs/(Ga,Mn)As and NiFe/(Ga,Mn)As bilayer films have shown FM interlayer coupling and independent magnetization behavior, respectively 4,5 . Of particular interest is the Fe/(Ga,Mn)As system, since the growth of epitaxial Fe/GaAs(001) films is well-established 6 . Remarkably, a recent x-ray magnetic circular dichroism (XMCD) study has shown that Fe may induce a proximity polarization in the near-surface region of (Ga,Mn)As, antiparallel to the Fe moment and persisting even above room temperature 7 . Devices incorporating Fe/(Ga,Mn)As therefore offer the prospect of obtaining non-volatile room temperature spin-polarization in a semiconductor.\nUntil now, no information has been revealed about the coupling of Fe to (Ga,Mn)As layers away from the nearsurface region. At the surface, the (Ga,Mn)As layer may be highly non-stoichiometric and Mn-rich, due to its nonequilibrium nature 8,9 . Previously, Fe/(Ga,Mn)As layers were produced by a process including exposure to air followed by sputtering and annealing prior to Fe deposition,", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "What does Kitaev show about spin- 1/2 model?", - "target_page": 1, - "target_passage": "spin- 1/2 model can be mapped to a model with one Majo- rana fermion per site coupled to Ising gauge fields on the links", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "I. INTRODUCTION.\nIn this paper we realize the Kitaev honeycomb lattice model as the low energy Hamiltonian for a spin rotation invariant system. The trick is not to use the physical spin as the spin in the Kitaev model, instead the spin-1/2 in Kitaev model is from some emergent two-fold degenerate low energy states in the elementary unit of physical system. This type of idea has been explored recently by Jackeli and Khaliullin 20 , in which the spin-1/2 in the Kitaev model is the low energy Kramers doublet created by strong spin-orbit coupling of t 2 g orbitals. In the model presented below, the Hilbert space of spin-1/2 in the Kitaev model is actually the two dimensional spin singlet sector of four antiferromagnetically coupled spin-1/2 moments, and the role of spin-1/2 operators(Pauli matrices) in the Kitaev model is replaced by certain combinations of S j · S k [or the spin-chirality S j · ( S k × S /lscript )] between the four spins.\nOne major drawback of the model to be presented is that it contains high order spin interactions(involves up to six or eight spins), thus is still unnatural. However it opens the possibility to realize exotic (exactly solvable) models from spin-1/2 Hamiltonian with spin rotation invariant interactions. We will discuss two possible routes to reduce this artificialness through controlled perturbative expansions, by coupling to optical phonons or by magnetic couplings between the elementary units.\nThe outline of this paper is as follows. In Section II we will lay out the pseudo-spin-1/2 construction. In Sec-\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin Rotation Invariant System\nFa Wang 1\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamiltonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low energy effective Hamiltonian is exact, without truncation errors in traditional perturbation series expansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and contains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model is represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet sector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin correlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this model. This exact construction is quite general and can be used to make other interesting spin-1/2 models from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the high order spin interactions from more natural couplings, which involves perturbative expansions thus breaks the exact mapping, although in a controlled manner.\nPACS numbers: 75.10.Jm, 75.10.Kt", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "I. INTRODUCTION.\nGreat efforts have been invested to better understand the properties of the Kitaev model. For example, several groups have pointed out that the fractionalized Majorana fermion excitations may be understood from the more familiar Jordan-Wigner transformation of 1D spin systems 2,3 . The analogy between the non-Abelian Ising vortices and vortices in p + ip superconductors has been raised in serveral works 4-7 . Exact diagonalization has been used to study the Kitaev model on small lattices 8 . And perturbative expansion methods have been developed to study the gapped phases of the Kitaev-type models 9 .\nMany generalizations of the Kitaev model have been\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled and open circles indicate two sublattices. x, y, z label the links along three different directions used in (1).\nderived as well. There have been several proposals to open the fermion gap for the non-Abelian phase without spoiling exact solvability 4,6 . And many generalizations to other(even 3D) lattices have been developed in the last few years 10-16 . All these efforts have significantly enriched our knowledge of exactly solvable models and quantum phases of matter.\nHowever, in the original Kitaev model and its later generalizations in the form of spin models, spin rotation symmetry is explicitly broken. This makes them harder to realize in solid state systems. There are many proposals to realized the Kitaev model in more controllable situations, e.g. in cold atom optical lattices 17,18 , or in superconducting circuits 19 . But it is still desirable for theoretical curiosity and practical purposes to realize the Kitaev-type models in spin rotation invariant systems.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "V. CONCLUSIONS.\nWe constructed the exactly solvable Kitaev honeycomb model 1 as the exact low energy effective Hamiltonian of a spin-1/2 model [equations (8) or (9)] with spin-rotation and time reversal symmetry. The spin in Kitaev model is represented as the pseudo-spin in the two-fold degenerate spin singlet subspace of a cluster of four antiferromagnetically coupled spin-1/2 moments. The physical spin model is a honeycomb lattice of such four-spin clusters, with certain inter-cluster interactions. The machinery for the exact mapping to pseudo-spin Hamiltonian was developed (see e.g. TABLE I), which is quite general and can be used to construct other interesting (exactly solvable) spin-1/2 models from spin rotation invariant systems.\nIn this construction the pseudo-spin correlations in the Kitaev model will be mapped to dimer or spin-chirality correlations in the physical spin system. The corresponding picture of the fractionalized Majorana fermion excitations and Ising vortices still remain to be clarified.\nThis exact construction contains high order physical spin interactions, which is undesirable for practical implementation. We described two possible approaches to reduce this problem: generating the high order spin interactions by perturbative expansion of the coupling to optical phonon, or the magnetic coupling between clusters. This perturbative construction will introduce truncation error of perturbation series, which may be controlled by small expansion parameters. Whether these constructions can be experimentally engineered is however beyond the scope of this study. It is conceivable that other perturbative expansion can also generate these high order spin interactions, but this possibility will be left for future works.", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe briefly describe some of the properties of (8). Its low energy states are entirely in the space that each of the clusters is a physical spin singlet (called cluster singlet subspace hereafter). Therefore physical spin correlations are strictly confined within each cluster. The excitations carrying physical spin are gapped, and their dynamics are 'trivial' in the sense that they do not move from one cluster to another. But there are non-trivial low energy physical spin singlet excitations, described by the pseudospins defined above. The correlations of the pseudo-spins can be mapped to correlations of their corresponding physical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation becomes chirality-chirality correlation, or four-dimer correlation. It will be interesting to see the corresponding picture of the exotic excitations in the Kitaev model, e.g. the Majorana fermion and the Ising vortex. However this will be deferred to future studies.\nIt is tempting to call this as an exactly solved spin liquid with spin gap ( ∼ J cluster ), an extremely short-range resonating valence bond(RVB) state, from a model with spin rotation and time reversal symmetry. However it should be noted that the unit cell of this model contains an even number of spin-1/2 moments (so does the original Kitaev model) which does not satisfy the stringent definition of spin liquid requiring odd number of electrons per unit cell. Several parent Hamiltonians of spin liquids have already been constructed. See for example, Ref. 24-27 .", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\n-\n-\nHowever there is another simpler representation of τ z , by the spin-chirality operator χ jk/lscript = S j · ( S k × S /lscript ). Explicit calculation shows that the effect of S 2 · ( S 3 × S 4 ) is -( √ 3 / 4) τ z in the physical singlet sector. This can also be proved by using the commutation relation [ S 2 · S 3 , S 2 · S 4 ] = i S 2 · ( S 3 × S 4 ). A complete list of all chirality operators is given in TABLE I. Therefore we can choose another representation of τ z ,\nτ z = -χ 234 / ( √ 3 / 4) = -(4 / √ 3) S 2 · ( S 3 × S 4 ) (6)\nThe above representations of τ x,y,z are all invariant under global spin rotation of the physical spins.\nWith the machinery of equations (4), (5), and (6), it will be straightforward to construct various pseudo-spin1/2 Hamiltonians on various lattices, of the Kitaev variety and beyond, as the exact low energy effective Hamiltonian of certain spin-1/2 models with spin-rotation symmetry. In these constructions a pseudo-spin lattice site actually represents a cluster of four spin-1/2 moments.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "I. INTRODUCTION.\nKitaev's exactly solvable spin-1/2 honeycomb lattice model 1 (noted as the Kitaev model hereafter) has inspired great interest since its debut, due to its exact solvability, fractionalized excitations, and the potential\n5\n5\n7\n2\nto realize non-Abelian anyons. The model simply reads\nH Kitaev = -∑ x -links J x τ x j τ x k -∑ y -links J y τ y j τ y k -∑ z -links J z τ z j τ z k (1)\nwhere τ x,y,z are Pauli matrices, and x, y, z -links are defined in FIG. 1. It was shown by Kitaev 1 that this spin1/2 model can be mapped to a model with one Majorana fermion per site coupled to Ising gauge fields on the links. And as the Ising gauge flux has no fluctuation, the model can be regarded as, under each gauge flux configuration, a free Majorana fermion problem. The ground state is achieved in the sector of zero gauge flux through each hexagon. The Majorana fermions in this sector have Dirac-like gapless dispersion resembling that of graphene, as long as | J x | , | J y | , and | J z | satisfy the triangular relation, sum of any two of them is greater than the third one 1 . It was further proposed by Kitaev 1 that opening of fermion gap by magnetic field can give the Ising vortices non-Abelian anyonic statistics, because the Ising vortex will carry a zero-energy Majorana mode, although magnetic field destroys the exact solvability.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe emphasize that because the first intra-cluster term ∑ cluster H cluster commutes with the latter Kitaev terms independent of the representation used, the Kitaev model is realized as the exact low energy Hamiltonian of this model without truncation errors of perturbation theories, namely no ( | J x,y,z | /J cluster ) 2 or higher order terms will be generated under the projection to low energy cluster singlet space. This is unlike, for example, the t/U expansion of the half-filled Hubbard model 22,23 , where at lowest t 2 /U order the effective Hamiltonian is the Heisenberg model, but higher order terms ( t 4 /U 3 etc.) should in principle still be included in the low energy effective Hamiltonian for any finite t/U . Similar comparison can be made to the perturbative expansion studies of the Kitaev-type models by Vidal et al. 9 , where the low energy effective Hamiltonians were obtained in certian anisotropic (strong bond/triangle) limits. Although the spirit of this work, namely projection to low energy sector, is the same as all previous perturbative approaches to effective Hamiltonians.\nNote that the original Kitaev model (1) has threefold rotation symmetry around a honeycomb lattice site, combined with a three-fold rotation in pseudo-spin space (cyclic permutation of τ x , τ y , τ z ). This is not apparent in our model (8) in terms of physical spins, under the current representation of τ x,y,z . We can remedy this by using a different set of pseudo-spin Pauli matrices τ ' x,y,z in (7),\nτ ' x = √ 1 / 3 τ z + √ 2 / 3 τ x , τ ' y = √ 1 / 3 τ z -√ 1 / 6 τ x + √ 1 / 2 τ y , τ ' z = √ 1 / 3 τ z -√ 1 / 6 τ x -√ 1 / 2 τ y\nWith proper representation choice, they have a symmetric form in terms of physical spins,", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nTABLE I: Correspondence between physical spin operators and pseudo-spin operators in the physical spin singlet sector of the four antiferromagnetically coupled physical spins. P jk = 2 S j · S k +1 / 2 are permutation operators, χ jk/lscript = S j · ( S k × S /lscript ) are spin-chirality operators. Note that several physical spin operators may correspond to the same pseudo-spin operator.\nP 12 , and P 34, pseudo-spin = τ x. P 13 , and P 24, pseudo-spin = - (1 / 2) τ x +( √ 3 / 2) τ y. P 14 , and P 23, pseudo-spin = - (1 / 2) τ x - ( √ 3 / 2) τ y. χ 234 , χ 341 , χ 412 , and χ 123, pseudo-spin = ( √ 3 / 4) τ z", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "I. Introduction.\n1\nII. Formulation of the Pseudo-spin-1/2 from Four-spin Cluster.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "How can fractionalised Majorana fermion excitations be understood?", - "target_page": 1, - "target_passage": "from the more familiar Jordan-Wigner transformation of 1D spin systems", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "D. The collective boson model\nWe now turn to a more microscopic model- the CB model. The model describes fermions interacting by exchanging soft, overdamped collective bosons in a particular, near-critical, spin or charge channel 31,44,45 . This interaction is responsible for the normal state self-energy and also gives rise to a superconductivity. A peculiar feature of the CB model is that the propagator of a collective boson changes below T c because this boson is not an independent degree of freedom (as in EB model) but is made out of low-energy fermions which are affected by superconductivity 32 .\nThe most relevant point for our discussion is that this model contains the physics which we identified above as a source of a potential sign change of ∆ W K . Namely, at strong coupling the fermionic self-energy in the NS is large because there exists strong scattering between low-energy fermions mediated by low-energy collective bosons. In the SCS, the density of low-energy fermions drops and a continuum collective excitations becomes gaped. Both effects reduce fermionic damping and lead to the increase of W K in a SCS. If this increase exceeds a conventional loss of W K due to a gap opening, the total ∆ W K may become positive.\nThe CB model has been applied numerous times to the cuprates, most often under the assumption that nearcritical collective excitations are spin fluctuations with momenta near Q = ( π, π ). This version of a CB boson is commonly known as a spin-fermion model. This model yields d x 2 -y 2 superconductivity and explains in a quantitative way a number of measured electronic features of the cuprates, in particular the near-absence of the quasiparticle peak in the NS of optimally doped and underdoped cuprates 39 and the peak-dip-hump structure in the ARPES profile in the SCS 31,32,46,47 . In our analysis we assume that a CB is a spin fluctuation.\nThe results for the conductivity within a spin-fermion model depend in quantitative (but not qualitative) way on the assumption for the momentum dispersion of a collective boson. This momentum dependence comes from", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "I. INTRODUCTION.\nKitaev's exactly solvable spin-1/2 honeycomb lattice model 1 (noted as the Kitaev model hereafter) has inspired great interest since its debut, due to its exact solvability, fractionalized excitations, and the potential\n5\n5\n7\n2\nto realize non-Abelian anyons. The model simply reads\nH Kitaev = -∑ x -links J x τ x j τ x k -∑ y -links J y τ y j τ y k -∑ z -links J z τ z j τ z k (1)\nwhere τ x,y,z are Pauli matrices, and x, y, z -links are defined in FIG. 1. It was shown by Kitaev 1 that this spin1/2 model can be mapped to a model with one Majorana fermion per site coupled to Ising gauge fields on the links. And as the Ising gauge flux has no fluctuation, the model can be regarded as, under each gauge flux configuration, a free Majorana fermion problem. The ground state is achieved in the sector of zero gauge flux through each hexagon. The Majorana fermions in this sector have Dirac-like gapless dispersion resembling that of graphene, as long as | J x | , | J y | , and | J z | satisfy the triangular relation, sum of any two of them is greater than the third one 1 . It was further proposed by Kitaev 1 that opening of fermion gap by magnetic field can give the Ising vortices non-Abelian anyonic statistics, because the Ising vortex will carry a zero-energy Majorana mode, although magnetic field destroys the exact solvability.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "D. The collective boson model\nhigh-energy fermions and is an input for the low-energy theory. Below we follow Refs. 31,33 and assume that the momentum dependence of a collective boson is flat near ( π, π ). The self energy within such model has been worked out consistently in Ref. 31,33. In the normal state\nΣ '' ( ω ) = -1 2 λ n ω sf log ( 1 + ω 2 ω 2 sf ) ω (19)\nΣ ' ( ω ) = -λ n ω sf arctan ω sf\nwhere λ n is the spin-fermion coupling constant, and ω sf is a typical spin relaxation frequency of overdamped spin collective excitations with a propagator\nχ ( q ∼ Q, Ω) = χ Q 1 -i Ω ω sf (20)\nwhere χ Q is the uniform static susceptibility. If we use Ornstein-Zernike form of χ ( q ) and use either Eliashberg 45 or FLEX computational schemes 48 , we get rather similar behavior of Σ as a function of frequency and rather similar behavior of optical integrals.\nThe collective nature of spin fluctuations is reflected in the fact that the coupling λ and the bosonic frequency ω sf are related: λ scales as ξ 2 , where ξ is the bosonic mass (the distance to a bosonic instability), and ω sf ∝ ξ -2 (see Ref. 49). For a flat χ ( q ∼ Q ) the product λω sf does not depend on ξ and is the overall dimensional scale for boson-mediated interactions.\nIn the SCS fermionic excitations acquire a gap. This gap affects fermionic self-energy in two ways: directly, via the change of the dispersion of an intermediate boson in the exchange process involving a CB, and indirectly, via the change of the propagator of a CB. We remind ourselves that the dynamics of a CB comes from a particlehole bubble which is indeed affected by ∆.\nThe effect of a d -wave pairing gap on a CB has been discussed in a number of papers, most recently in 31 . In\n11\na SCS a gapless continuum described by Eq. (20) transforms into a gaped continuum, with a gap about 2∆ and a resonance at ω = ω 0 < 2∆, where for a d -wave gap we define ∆ as a maximum of a d -wave gap.", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" - }, - { - "text": "I. INTRODUCTION\nFIG. 1: Schematic behavior of ∆ W vs ω c , Eq. (4). The limiting value of ∆ W at ω c = ∞ is ∆ W K given by Eq. (3) Depending on the value of ∆ W K , there can be either one sign change of ∆ W (panels a and c), or no sign changes (panel b), or two sign changes (panel d).\nIn our work, we perform direct numerical calculations of optical integrals at T = 0 for a lattice dispersion extracted from ARPES of the cuprates. The goal of our work is two-fold. First, we perform calculations of the optical integral in the NS and analyze how rapidly W ( ω c ) approaches W K , in other words we check how much of the Kubo sum is recovered up to the scale of the bandwidth. Second, we analyze the difference between optical\n3\nintegral in the SCS at T = 0 and in the NS extrapolated to T = 0 and compare the cut off effect ∆ f ( ω c ) to ∆ W K term. We also analyze the sign of ∆ W ( ω c ) at large frequencies and discuss under what conditions theoretical W ( ∞ ) increases in the SCS.\nWe perform calculations for four models. First is a conventional BCS model with impurities (BCSI model). Second is an Einstein boson (EB) model of fermions interacting with a single Einstein boson whose propagator does not change between NS and SCS. These two cases will illustrate a conventional idea of the spectral weight in SCS being less than in NS. Then we consider two more sophisticated models: a phenomenological 'marginal Fermi liquid with impurities' (MFLI) model of Norman and P'epin 30 , and a microscopic collective boson (CB) model 31 in which in the NS fermions interact with a gapless continuum of bosonic excitations, but in a d -wave SCS a gapless continuum splits into a resonance and a gaped continuum. This model describes, in particular, interaction of fermions with their own collective spin fluctuations 32 via\nΣ( k, Ω) = 3 g 2 ∫ dω 2 π d 2 q (2 π ) 2 χ ( q, ω ) G ( k + q, ω +Ω) (6)", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0764.pdf" - }, - { - "text": "C. Marginal Fermi liquid model\nFor their analysis of the optical integral, Norman and P'epin 30 introduced a phenomenological model for the self energy which fits normal state scattering rate measurements by ARPES 41 . It constructs the NS Σ '' ( ω ) out of two contributions - impurity scattering and electronelectron scattering which they approximated phenomenologically by the marginal Fermi liquid form of αω at small frequencies 6 (MFLI model). The total Σ '' is\nΣ '' ( ω ) = Γ + α | ω | f ( ω ω sat ) (17)\nwhere ω sat is about ∼ 1 2 of the bandwidth, and f ( x ) ≈ 1 for x < 1 and decreases for x > 1. In Ref 30 f ( x ) was assumed to scale as 1 /x at large x such that Σ '' is flat at large ω . The real part of Σ( ω ) is obtained from KramersKronig relations. For the superconducting state, they obtained Σ '' by cutting off the NS expression on the lower end at some frequency ω 1 (the analog of ω 0 +∆ that we had for EB model):\nΣ '' ( ω ) = (Γ + α | ω | )Θ( | ω | -ω 1 ) (18)\nwhere Θ( x ) is the step function. In reality, Σ '' which fits ARPESin the NS has some angular dependence along the Fermi surface 42 , but this was ignored for simplicity. This model had gained a lot of attention as it predicted the optical sum in the SCS to be larger than in the NS, i.e., ∆ W > 0 at large frequencies. This would be consistent with the experimental findings in Refs. 8,9 if, indeed, one identifies ∆ W measured up to 1eV with ∆ W K .\nWe will show below that the sign of ∆ W in the MFLI model actually depends on how the normal state results are extended to the superconducting state and, moreover, will argue that ∆ W K is actually negative if the extension is done such that at α = 0 the results are consistent with\n8\nBCSI model. However, before that, we show in Figs 1012 the conductivities and the optical integrals for the original MFLI model.\nω\nσ", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0764.pdf" - }, - { - "text": "III. CONCLUSION\nIn this work we analyzed the behavior of optical integrals W ( ω c ) ∝ ∫ ω c o σ ( ω ) dω and Kubo sum rules in the normal and superconducting states of interacting fermionic systems on a lattice. Our key goal was to understand what sets the sign of ∆ W K = ∆ W ( ∞ ) between the normal and superconducting states and what is the behavior of W ( ω c ) and ∆ W ( ω c ) at finite ω c . In a weak coupling BCS superconductor, ∆ W ( ω c ) is positive at ω c < 2∆ due to a contribution from superfluid density, but becomes negative at larger ω c , and approach a negative value of ∆ W K . Our study was motivated by fascinating optical experiments on the cuprates 7-10 . In overdoped cuprates, there is clear indication 11 that ∆ W ( ω c ) becomes negative above a few ∆, consistent with BCS behavior. In underdoped cuprates, two groups argued 8,9 that ∆ W integrated up to the bandwidth remains positive, while the other group argued 10 that it is negative.\nThe reasoning why ∆ W K may potentially change sign at strong coupling involves the correlation between -W K and the kinetic energy. In the BCS limit, kinetic energy obviously increases in a SCS because of gap opening, hence -W K increases, and ∆ W K is negative. At strong coupling, there is a counter effect - fermions become more mobile in a SCS due to a smaller self-energy.\nWe considered four models: a BCS model with impurities, a model of fermions interacting with an Einstein boson, a phenomenological MFL model with impurities, and a model of fermions interacting with collective spin fluctuations. In all cases, we found that ∆ W K is negative, but how it evolves with ω c and how much of the sum rule is recovered by integrating up to the bandwidth depends on the model.\nThe result most relevant to the experiments on the cuprates is obtained for the spin fluctuation model. We found that at strong coupling, the zero-crossing of δW ( ω c ) occurs at a frequency which increases with the coupling strength and may become larger than the bandwidth at a truly strong coupling. Still, at even larger frequencies, ∆ W ( ω c ) is negative.", - "page_start": 13, - "page_end": 13, - "source_file": "1001.0764.pdf" - }, - { - "text": "I. INTRODUCTION.\nGreat efforts have been invested to better understand the properties of the Kitaev model. For example, several groups have pointed out that the fractionalized Majorana fermion excitations may be understood from the more familiar Jordan-Wigner transformation of 1D spin systems 2,3 . The analogy between the non-Abelian Ising vortices and vortices in p + ip superconductors has been raised in serveral works 4-7 . Exact diagonalization has been used to study the Kitaev model on small lattices 8 . And perturbative expansion methods have been developed to study the gapped phases of the Kitaev-type models 9 .\nMany generalizations of the Kitaev model have been\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled and open circles indicate two sublattices. x, y, z label the links along three different directions used in (1).\nderived as well. There have been several proposals to open the fermion gap for the non-Abelian phase without spoiling exact solvability 4,6 . And many generalizations to other(even 3D) lattices have been developed in the last few years 10-16 . All these efforts have significantly enriched our knowledge of exactly solvable models and quantum phases of matter.\nHowever, in the original Kitaev model and its later generalizations in the form of spin models, spin rotation symmetry is explicitly broken. This makes them harder to realize in solid state systems. There are many proposals to realized the Kitaev model in more controllable situations, e.g. in cold atom optical lattices 17,18 , or in superconducting circuits 19 . But it is still desirable for theoretical curiosity and practical purposes to realize the Kitaev-type models in spin rotation invariant systems.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "D. The collective boson model\nFIG. 22: Top - conductivity at a larger value of ω sf λ ( ω sf = 26 meV , λ = 7) consistent with the one used in Ref.33). Bottom - ∆ W with and without lattice. Observe that the frequency of zero crossing of ∆ W enhances compared to the case of a smaller λω sf and becomes comparable to the bandwidth. At energies smaller than the bandwidth, ∆ W > 0, as in the Norman- P'epin model.\nFIG. 23: Kinetic energy difference between the SCS and the NS, δ KE We set λ to be either λ = 1 or λ = 10 and varied ω sf thus changing the overall prefactor in the self-energy. At weak coupling ( λ = 1) the behavior is BCS-like δ KE is positive and increases with the overall factor in the self-energy. At strong coupling ( λ = 7), δ KE shows a reverse trend at larger ω sf .\nThe negative sign of ∆ W ( ω c ) above a relatively small ω c ∼ 0 . 1 -0 . 2 eV implies that the 'compensating' effect from the fermionic self-energy on ∆ W is not strong enough to overshadow the decrease of the optical integral in the SCS due to gap opening. In other words,the CB model displays the same behavior as BCSI, EB, and\n13\nmodified MFLI models. It is interesting that this holds despite the fact that for large λ CB model displays the physics one apparently needs to reverse the sign of ∆ W K - the absence of the quasiparticle peak in the NS and its emergence in the SCS accompanied by the dip and the hump at larger energies. The absence of coherent quasiparticle in the NS at large λ is also apparent form Fig 21 where we show the normal state distribution functions for two different λ . For large λ the jump (which indicates the presence of quasiparticles) virtually disappears.", - "page_start": 12, - "page_end": 13, - "source_file": "1001.0764.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nTo estimate the effect of adsorbates on the electrical conductance of doped CNTs, we first consider the change in conductance when a single molecule is adsorbed on a metal site of an otherwise pristine CNT. In Fig. 2(b) we show the calculated change in conductance relative to the metal site with no adsorbate. In contrast to the binding energies, there are no clear trends in the conductances. The sensitivity of the conductance is perhaps most clearly demonstrated by the absence of correlation between different types of vacancies, i.e. between the three panels in Fig. 2(b). Close to the Fermi level, the conductance of a perfect armchair CNT equals 2 G 0 . The presence of the metal dopant leads to several dips in the transmission function known as Fano antiresonances [20]. The position and shape of these dips depend on the d -levels of the transition metal atom, the character of its bonding to the CNT, and is further affected by the presence of the adsorbate molecule. The coupling of all these factors is very complex and makes it difficult to estimate or rationalize the value of the conductance. For the spin polarized cases, we use the spin-averaged\n3\nconductances, i.e. G = ( G ↑ + G ↓ ) / 2.\nNext, we estimate the resistance of a CNT containing several impurities (a specific metal dopant with different molecular adsorbates). Under the assumption that the electron phasecoherence length, l φ , is smaller than the average distance between the dopants, d , we may neglect quantum interference and obtain the total resistance by adding the scattering resistances due to each impurity separately. The scattering resistance due to a single impurity is given by\nR s ( X ) = 1 /G ( X ) -1 / ( 2 G 0 ) , (6)\nwhere G ( X ) is the Landauer conductance of the pristine CNT with a single metal dopant occupied by molecule X and 1 / ( 2 G 0 ) is the contact resistance of a (6,6) CNT.\nWe may now obtain the total resistance per dopant site relative to the reference background signal as a function of the target molecule concentration", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - }, - { - "text": "I. INTRODUCTION\nwhere g is the spin-fermion coupling, and χ ( q, ω ) is the spin susceptibility whose dynamics changes between NS and SCS.\nFrom our analysis we found that the introduction of a finite fermionic bandwidth by means of a lattice has generally a notable effect on both W and ∆ W . We found that for all models except for BCSI model, only 70% -80% of the optical spectral weight is obtained by integrating up to the bandwidth. In these three models, there also exists a wide range of ω c in which the behavior of ∆ W ( ω c ) is due to variation of ∆ f ( ω c ) which is dominant comparable to the ∆ W K term. This dominance of the cut off term is consistent with the analysis in Refs. 21,22,33.\nWe also found that for all models except for the original version of the MFLI model the optical weight at the highest frequencies is greater in the NS than in the SCS (i.e., ∆ W < 0). This observation is consistent with the findings of Abanov and Chubukov 32 , Benfatto et. al. 28 , and Karakozov and Maksimov 34 . In the original version of the MFLI model 30 the spectral weight in SCS was found to be greater than in the NS (∆ W > 0). We show that the behavior of ∆ W ( ω c ) in this model crucially depends on how the fermionic self-energy modeled to fit ARPES data in a NS is modified when a system becomes a superconductor and can be of either sign. We also found, however, that ω c at which ∆ W becomes negative rapidly increases with the coupling strength and at strong coupling becomes comparable to the bandwidth. In the CB model, which, we believe, is most appropriate for the application to the cuprates, ∆ W K = ∆ W ( ∞ ) is quite small, and at strong coupling a negative ∆ W ( ω c ) up to ω c ∼ 1 eV is nearly compensated by the optical integral between ω c and 'infinity', which, in practice, is\nan energy of interband transitions, which is roughly 2 eV . This would be consistent with Refs. 8,9.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0764.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "What happens when the spin-rotation symmetry is explicitly broken?", - "target_page": 2, - "target_passage": "makes them harder to realize in solid state systems", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "V. CONCLUSIONS.\nWe constructed the exactly solvable Kitaev honeycomb model 1 as the exact low energy effective Hamiltonian of a spin-1/2 model [equations (8) or (9)] with spin-rotation and time reversal symmetry. The spin in Kitaev model is represented as the pseudo-spin in the two-fold degenerate spin singlet subspace of a cluster of four antiferromagnetically coupled spin-1/2 moments. The physical spin model is a honeycomb lattice of such four-spin clusters, with certain inter-cluster interactions. The machinery for the exact mapping to pseudo-spin Hamiltonian was developed (see e.g. TABLE I), which is quite general and can be used to construct other interesting (exactly solvable) spin-1/2 models from spin rotation invariant systems.\nIn this construction the pseudo-spin correlations in the Kitaev model will be mapped to dimer or spin-chirality correlations in the physical spin system. The corresponding picture of the fractionalized Majorana fermion excitations and Ising vortices still remain to be clarified.\nThis exact construction contains high order physical spin interactions, which is undesirable for practical implementation. We described two possible approaches to reduce this problem: generating the high order spin interactions by perturbative expansion of the coupling to optical phonon, or the magnetic coupling between clusters. This perturbative construction will introduce truncation error of perturbation series, which may be controlled by small expansion parameters. Whether these constructions can be experimentally engineered is however beyond the scope of this study. It is conceivable that other perturbative expansion can also generate these high order spin interactions, but this possibility will be left for future works.", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin Rotation Invariant System\nFa Wang 1\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamiltonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low energy effective Hamiltonian is exact, without truncation errors in traditional perturbation series expansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and contains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model is represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet sector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin correlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this model. This exact construction is quite general and can be used to make other interesting spin-1/2 models from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the high order spin interactions from more natural couplings, which involves perturbative expansions thus breaks the exact mapping, although in a controlled manner.\nPACS numbers: 75.10.Jm, 75.10.Kt", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "I. INTRODUCTION.\nIn this paper we realize the Kitaev honeycomb lattice model as the low energy Hamiltonian for a spin rotation invariant system. The trick is not to use the physical spin as the spin in the Kitaev model, instead the spin-1/2 in Kitaev model is from some emergent two-fold degenerate low energy states in the elementary unit of physical system. This type of idea has been explored recently by Jackeli and Khaliullin 20 , in which the spin-1/2 in the Kitaev model is the low energy Kramers doublet created by strong spin-orbit coupling of t 2 g orbitals. In the model presented below, the Hilbert space of spin-1/2 in the Kitaev model is actually the two dimensional spin singlet sector of four antiferromagnetically coupled spin-1/2 moments, and the role of spin-1/2 operators(Pauli matrices) in the Kitaev model is replaced by certain combinations of S j · S k [or the spin-chirality S j · ( S k × S /lscript )] between the four spins.\nOne major drawback of the model to be presented is that it contains high order spin interactions(involves up to six or eight spins), thus is still unnatural. However it opens the possibility to realize exotic (exactly solvable) models from spin-1/2 Hamiltonian with spin rotation invariant interactions. We will discuss two possible routes to reduce this artificialness through controlled perturbative expansions, by coupling to optical phonons or by magnetic couplings between the elementary units.\nThe outline of this paper is as follows. In Section II we will lay out the pseudo-spin-1/2 construction. In Sec-\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\n-\n-\nHowever there is another simpler representation of τ z , by the spin-chirality operator χ jk/lscript = S j · ( S k × S /lscript ). Explicit calculation shows that the effect of S 2 · ( S 3 × S 4 ) is -( √ 3 / 4) τ z in the physical singlet sector. This can also be proved by using the commutation relation [ S 2 · S 3 , S 2 · S 4 ] = i S 2 · ( S 3 × S 4 ). A complete list of all chirality operators is given in TABLE I. Therefore we can choose another representation of τ z ,\nτ z = -χ 234 / ( √ 3 / 4) = -(4 / √ 3) S 2 · ( S 3 × S 4 ) (6)\nThe above representations of τ x,y,z are all invariant under global spin rotation of the physical spins.\nWith the machinery of equations (4), (5), and (6), it will be straightforward to construct various pseudo-spin1/2 Hamiltonians on various lattices, of the Kitaev variety and beyond, as the exact low energy effective Hamiltonian of certain spin-1/2 models with spin-rotation symmetry. In these constructions a pseudo-spin lattice site actually represents a cluster of four spin-1/2 moments.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "I. INTRODUCTION\nThe study of low dimensional frustrated magnetic systems 1 still raises great interest, both in consequence of theoretical aspects, related to their peculiar critical properties 2 , and in view of possible technological applications 3 . Indeed, beside conventional ferromagnetic or antiferromagnetic phase transitions, in many new materials other nontrivial and unconventional forms of ordering have been observed 4,5 . A quantity of particular interest in this context is the spin chirality, an order parameter which turned out to be extremely relevant in, e.g., magnetoelectric materials 6 , itinerant MnSi 7 , binary compounds as FeGe 8 , glass transition of spins 9 , and XY helimagnets, as Holmium, Terbium or Dysprosium 10 . In the latter case, a new universality class was predicted because a Z 2 × SO (2) symmetry is spontaneously broken in the ordered phase 2 : In fact, when dealing with such systems, in addition to the SO (2) symmetry of the spin degrees of freedom /vector S i , one has to consider also the Z 2 symmetry of the spin chirality κ ij ∝ [ /vector S i × /vector S j ] z .\nFor these rare-earth elements, the development of new and sophisticated experimental methods 11 has allowed to obtain ultra-thin films where the non-collinear modulation is comparable with the film thickness. Under such conditions the lack of translational invariance due to the presence of surfaces results decisive in order to observe a drastic change of the magnetic structures 12 . Recent experimental data on ultra-thin Holmium films 13 have been lately interpreted and discussed 14,15 on the basis of detailed classical Monte Carlo (MC) simulations of a spin Hamiltonian, which is believed to give a realistic modeling of bulk Holmium. Such Hamiltonian, proposed by Bohr et al. 16 , allows for competitive middle-range in-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe briefly describe some of the properties of (8). Its low energy states are entirely in the space that each of the clusters is a physical spin singlet (called cluster singlet subspace hereafter). Therefore physical spin correlations are strictly confined within each cluster. The excitations carrying physical spin are gapped, and their dynamics are 'trivial' in the sense that they do not move from one cluster to another. But there are non-trivial low energy physical spin singlet excitations, described by the pseudospins defined above. The correlations of the pseudo-spins can be mapped to correlations of their corresponding physical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation becomes chirality-chirality correlation, or four-dimer correlation. It will be interesting to see the corresponding picture of the exotic excitations in the Kitaev model, e.g. the Majorana fermion and the Ising vortex. However this will be deferred to future studies.\nIt is tempting to call this as an exactly solved spin liquid with spin gap ( ∼ J cluster ), an extremely short-range resonating valence bond(RVB) state, from a model with spin rotation and time reversal symmetry. However it should be noted that the unit cell of this model contains an even number of spin-1/2 moments (so does the original Kitaev model) which does not satisfy the stringent definition of spin liquid requiring odd number of electrons per unit cell. Several parent Hamiltonians of spin liquids have already been constructed. See for example, Ref. 24-27 .", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nTABLE I: Correspondence between physical spin operators and pseudo-spin operators in the physical spin singlet sector of the four antiferromagnetically coupled physical spins. P jk = 2 S j · S k +1 / 2 are permutation operators, χ jk/lscript = S j · ( S k × S /lscript ) are spin-chirality operators. Note that several physical spin operators may correspond to the same pseudo-spin operator.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nTABLE I: Correspondence between physical spin operators and pseudo-spin operators in the physical spin singlet sector of the four antiferromagnetically coupled physical spins. P jk = 2 S j · S k +1 / 2 are permutation operators, χ jk/lscript = S j · ( S k × S /lscript ) are spin-chirality operators. Note that several physical spin operators may correspond to the same pseudo-spin operator.\nP 12 , and P 34, pseudo-spin = τ x. P 13 , and P 24, pseudo-spin = - (1 / 2) τ x +( √ 3 / 2) τ y. P 14 , and P 23, pseudo-spin = - (1 / 2) τ x - ( √ 3 / 2) τ y. χ 234 , χ 341 , χ 412 , and χ 123, pseudo-spin = ( √ 3 / 4) τ z", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nIn this Section we will construct the pseudo-spin-1/2 from a cluster of four physical spins, and map the physical spin operators to pseudo-spin operators. The mapping constructed here will be used in later Sections to construct the effective Kitaev model. In this Section we will work entirely within the four-spin cluster, all unspecified physical spin subscripts take values 1 , . . . , 4.\nConsider a cluster of four spin-1/2 moments(called physical spins hereafter), labeled by S 1 ,..., 4 , antiferromagnetically coupled to each other (see the right bottom part of FIG. 2). The Hamiltonian within the cluster(up to a constant) is simply the Heisenberg antiferromagnetic(AFM) interactions,\nH cluster = ( J cluster / 2) ( S 1 + S 2 + S 3 + S 4 ) 2 (2)\nThe energy levels should be apparent from this form: one group of spin-2 quintets with energy 3 J cluster , three groups of spin-1 triplets with energy J cluster , and two spin singlets with energy zero. We will consider large positive\nJ cluster limit. So only the singlet sector remains in low energy.\nThe singlet sector is then treated as a pseudo-spin-1/2 Hilbert space. From now on we denote the pseudo-spin1/2 operators as T = (1 / 2) /vectorτ , with /vectorτ the Pauli matrices. It is convenient to choose the following basis of the pseudo-spin\n| τ z = ± 1 〉 = 1 √ 6 ( | ↓↓↑↑〉 + ω -τ z | ↓↑↓↑〉 + ω τ z | ↓↑↑↓〉 + | ↑↑↓↓〉 + ω -τ z | ↑↓↑↓〉 + ω τ z | ↑↓↓↑〉 ) (3)\nwhere ω = e 2 πi/ 3 is the complex cubic root of unity, | ↓↓↑↑〉 and other states on the right-hand-side(RHS) are basis states of the four-spin system, in terms of S z quantum numbers of physical spins 1 , . . . , 4 in sequential order. This pseudo-spin representation has been used by Harris et al. to study magnetic ordering in pyrochlore antiferromagnets 21 .", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "IV. GENERATE THE HIGH ORDER PHYSICAL SPIN INTERACTIONS BY PERTURBATIVE EXPANSION.\nOne major drawback of the present construction is that it involves high order interactions of physical spins[see (8) and (9)], thus is 'unnatural'. In this Section we will make compromises between exact solvability and naturalness. We consider two clusters j and k and try to generate the J x,y,z interactions in (7) from perturbation series expansion of more natural(lower order) physical spin interactions. Two different approaches for this purpose will be laid out in the following two Subsections. In Subsection IV A we will consider the two clusters as two tetrahedra, and couple the spin system to certain optical phonons, further coupling between the phonon modes\n5\nFIG. 3: Illustration of the tetragonal to orthorhombic Q E 1 (top) and Q E 2 (bottom) distortion modes. (a) Perspective view of the tetrahedron. 1 , . . . , 4 label the spins. Arrows indicate the motion of each spin under the distortion mode. (b) Top view of (a). (c)(d) Side view of (a).\nof the two clusters can generate at lowest order the desired high order spin interactions. In Subsection IV B we will introduce certain magnetic, e.g. Heisenberg-type, interactions between physical spins of different clusters, at lowest order(second order) of perturbation theory the desired high order spin interactions can be achieved. These approaches involve truncation errors in the perturbation series, thus the mapping to low energy effect Hamiltonian will no longer be exact. However the error introduced may be controlled by small expansion parameters. In this Section we denote the physical spins on cluster j ( k ) as j 1 , . . . , j 4 ( k 1 , . . . , k 4), and denote pseudo-spins on cluster j ( k ) as /vectorτ j ( /vectorτ k ).", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "What is the Oxbridge Academy email?", - "target_page": 59, - "target_passage": "Email: info@oxbridgeacademy.co.za", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "IMPROVE YOUR MARKS!\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 41, - "page_end": 42, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Did you enjoy reading this book?\nJoin our online social community and share your opinion:\nwww.facebook.com/oxbridgeacademysa twitter.com/oxbridgeEdu www.linkedin.com/company/oxbridge-academy\nOxbridge Academy is an established distance learning college offer -ing skills courses, national qualifications, and internationally recognised courses to students in South Africa and abroad.\nWith our head office in Stellenbosch in the Western Cape, we cater to our students' needs by recruiting industry-expert tutors to provide academic assistance via telephone and e-mail, as well as by designing our study material in such a way that it is clear, simple, and easy for our students to understand.\nWith us, studying from home is easy, affordable, and convenient.", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Be clear and concise.\nMake sure that your tutor will be able to understand what it is that you are asking.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 33, - "page_end": 34, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Distinguish:\nClearly identify the differences between ideas, facts or views.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 39, - "page_end": 40, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "· Keep it professional.\nDon't pass on spam e-mails, chain letters, or inappropriate jokes, and don't spread gossip via e-mail.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 53, - "page_end": 54, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "1. Read (and follow) the instructions carefully.\nIf you are an Oxbridge Academy student, the general assignment guidelines will be provided in your 'Success' Study Guide. Specific instructions will also be included at the beginning of each of your assignments.", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 4 - PAY YOUR REGISTRATION FEE AND SEND IN YOUR FORM\nDifferent courses have different registration fees. Please check the course fees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to find out how much you need to pay to register for your chosen course, and pay this amount using the banking details provided at the bottom of the registration form. Remember to attach your proof of payment.\nIf you are under the age of 18, your parent or guardian will need to sign this section of the form to state that they are aware of your registration with Oxbridge Academy, and that they do not have any objections. If you are unemployed, you will need a guarantor to sign this section of the form. Your parent or guarantor will be held responsible if you miss any of your payments in relation to your course fees.\nDeveloped for Oxbridge Academy\n3\nBasic English Language Skills\n4\nSend your registration form to the registrations office at Oxbridge Academy via one of the following channels:\nFax:\n086 262 5550\nPost: PO Box 12723, Die Boord, 7613 E-mail: registrar@oxbridgeacademy.co.za\n6\nBasic English Language Skills", - "page_start": 25, - "page_end": 27, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 1 - SELECT YOUR COURSE\nOxbridge Academy Short Course: Marketing Management\nADV101\nBefore you start filling in the registration form, you need to choose your course. Once you've identified the course that you would like to study, remember to check that you meet the entry requirements.\nYou can find the course name and course code for your chosen course on the relevant detailed course information page on our website. Have a look at the example in the screenshot below (the course name and course code are circled in red):\nPlease make sure to check the accreditation status of your chosen course. Some of our courses are non-credit bearing skills development courses, which are neither accredited by external bodies nor registered on the NQF. Please go to our website: oxbridgeacademy.co.za for more information about our skills development courses.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 21, - "page_end": 22, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "TIPS FOR FILLING IN YOUR COLLEGE REGISTRATION FORM\nApplying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a daunting experience. Not only do you need to choose a course, but you also need to make sure that you:\n· meet the entry requirements\n· meet the deadlines\n· fill in the forms correctly\n· send the forms to the right address\n· include all the necessary attachments\nTo make the college registration process easier for you, we've compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general tips that will be relevant to the application and registration processes at other colleges.", - "page_start": 20, - "page_end": 20, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "CONTACT NUMBERS:\nTel: 021 1100 200 Tel:+2721 883 2454 (international) Fax: 086 111 2121\nFax: +2721 883 2378 (international)\nWhatsapp: 0605671585 Email: info@oxbridgeacademy.co.za\nPostal Address:\nPO Box 12723, Die Boord, Stellenbosch, 7613\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section 31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070.\nDeveloped for Oxbridge Academy", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "When is it necessary to use a host multipathing driver for load balancing?", - "target_page": 340, - "target_passage": "For load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations: Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes Protection from a host HBA failure (if two HBAs are in use) Protection from fabric failures if the host is connected through two HBAs to two separate fabrics Provide load balancing across the host HBA", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "Assigning a public IP by using a load balancer service\nThis method allows traffic to nonstandard ports through an IP address that is assigned from a pool.\nIf you do not need a specific external IP address, you can configure a load balancer service to allow external access to an OpenShift Container Platform cluster.\nA load balancer service allocates a unique IP from a configured pool. The load balancer features a single edge router IP (which can be a virtual IP (VIP), but is still a single machine for initial load balancing).", - "page_start": 81, - "page_end": 81, - "source_file": "sg248459.pdf" - }, - { - "text": "Load balancers\nThis guide uses an external load balancer that is running HAproxy to offer a single entry point for the many Red Hat OpenShift Container Platform components. Organizations can provide their own deployed load balancers if the service exists.\nThe Red Hat OpenShift Container Platform console, which is provided by the Red Hat OpenShift Container Platform master nodes, can be spread across multiple instances to provide load balancing and HA properties.\nApplication traffic passes through the Red Hat OpenShift Container Platform Router on its way to the container processes. The Red Hat OpenShift Container Platform Router is a reverse proxy service container that multiplexes the traffic to multiple containers that make up a scaled application that is running inside Red Hat OpenShift Container Platform. The load balancer that is used by infrastructure nodes acts as the public view for the Red Hat OpenShift Container Platform applications.\nThe destination for the master and application traffic must be set in the load balancer configuration after each instance is created, the floating IP address is assigned, and before the installation. A single HAproxy Load Balancer can forward both sets of traffic to different destinations.\nChapter 5. Red Hat OpenShift installation planning and considerations\n93\n94\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nWhen configuring multiple masters, the cluster installation process supports the native HA method. This method uses the native HA master capabilities that are built into OpenShift Container Platform and can be combined with any Load Balancing solution.\nIf a host is defined in the [lb] section of the inventory file, Ansible installs and configures HAProxy automatically as the load balancing solution. If no host is defined, it is assumed that you pre-configured an external load balancing solution of your choice to balance the master API (port 8443) on all master hosts.\nNote: The HAProxy Load Balancer is intended to demonstrate the API server's HA mode and is not recommended for production environments. If you are deploying to a cloud provider, Red Hat recommends deploying a cloud-native TCP-based Load Balancer or take other steps to provide a highly available load balancer.", - "page_start": 108, - "page_end": 109, - "source_file": "sg248459.pdf" - }, - { - "text": "13.2.3 Load testing\nThe goal of load testing is to verify that, under stressful system conditions, the required amount of data can be loaded into the Content Manager OnDemand system within a time window.\nA general approach to load testing a system is described:\n/SM590000 Parallel loads: Run a single load and measure the load throughput. If the throughput does not meet the requirements, run two loads in parallel and measure the throughput. While the loads are run, collect system statistics to determine the system resources that are being used and any potential bottlenecks. Tune or acquire additional system resources as needed. Progressively increase the number of parallel loads until the required throughput is met.\nNote: For most users, a single load process meets the ingestion throughput requirements.\n/SM590000 Data types and exits: A different data type, and whether an exit is started during the load process, affects the load throughput. Test samples of the different types that represent the general loads.\nChapter 13. Performance\n303", - "page_start": 326, - "page_end": 326, - "source_file": "sg246915.pdf" - }, - { - "text": "Load Data\nThe Load Data parameter determines the primary storage node into which Content Manager OnDemand loads data. When the Load Type is Fixed, Load Data must be selected for one primary storage node. When Load Type is Local, Load Data must be selected for one primary node for each object server that is associated with the storage set.", - "page_start": 122, - "page_end": 122, - "source_file": "sg246915.pdf" - }, - { - "text": "Performance considerations\nFor the best performance and availability, use ISL trunking or port channeling. Independent ISL links can easily become overloaded and turn into performance bottlenecks. Bonded or trunked ISLs automatically share load and provide better redundancy in a failure.\n740\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n/SM590000 Number of paths per host multipath device\nThe maximum supported number of paths per multipath device that is visible on the host is eight. Although the IBM Subsystem Device Driver Path Control Module (SDDPCM), related products, and most vendor multipathing software can support more paths, the Storwize V7000 expects a maximum of eight paths. In general, you see only an effect on performance from more paths than eight. Although the IBM Spectrum Virtualize can work with more than eight paths, this design is technically unsupported.\n/SM590000 Do not intermix dissimilar array types or sizes\nAlthough the IBM Spectrum Virtualize supports an intermix of differing storage within storage pools, it is best to always use the same array model, Redundant Array of Independent Disks (RAID) mode. RAID size (RAID 5 6+P+S does not mix well with RAID 6 14+2), and drive speeds.\nRules and guidelines are no substitution for monitoring performance. Monitoring performance can provide a validation that design expectations are met, and identify opportunities for improvement.", - "page_start": 761, - "page_end": 762, - "source_file": "sg247938.pdf" - }, - { - "text": "Availability zones (host groups)\nHost groups, also known as host aggregates in OpenStack's terminology, allow you to create virtual boundaries around a group of hosts. It is a logical group of hosts, regardless of any features that they might or might not have in common. For example, the hosts feature the same architecture, network configuration, or storage, or hosts in the same rack or data center.\nWhen a host group is created by using the user interface, an availability zone with the same name is created and assigned to the host group. PowerVC also supports the standard OpenStack APIs for host groups and availability zones.\nHost groups (availability zones) include the following features:\n/SM590000 Every host must be in a host group\nAny hosts that do not belong to a user-defined host group are members of the default host group. The default host group cannot be deleted.\n/SM590000 Virtual machines are kept within the host group\nA virtual machine can be deployed to a specific host or to a host group. After deployment, that virtual machine must always be migrated or remote restarted within the host group.\n/SM590000 Placement policies are associated with host groups\nEvery host within a host group is subject to the host group's placement policy. The default placement policy is striping.\n/SM590000 Automated Remote Restart\nIf enabled, the PowerVC monitors hosts for failure by using the Platform Resource Scheduler (PRS) HA service. If a host fails, PowerVC automatically remote restarts the VMs from the failed host to another host within a host group.\n/SM590000 Dynamic Resource Optimizer (DRO)\nIf enabled, DRO continuously monitors your cloud environment's usage. You can specify that DRO monitors CPU usage or available memory. When a host is found to be overused, the DRO attempts to correct the situation by performing the action that you specified. It can migrate VMs to another host within a host group or, when applicable, work with Capacity on Demand (CoD) to activate mobile cores.\nNote: A host can belong only to one host group (availability zone).\nChapter 5. Red Hat OpenShift installation planning and considerations\n81", - "page_start": 96, - "page_end": 96, - "source_file": "sg248459.pdf" - }, - { - "text": "8.1 Host attachment overview\nThe IBM Storwize V7000 system supports a wide range of host types (both IBM and non-IBM). This feature makes it possible to consolidate storage in an open systems environment into a common pool of storage. Then, you can use and manage the storage pool more efficiently as a single entity from a central point on the storage area network (SAN).\nThe ability to consolidate storage for attached open systems hosts provides the following benefits:\n/SM590000 Easier storage management\n/SM590000 Increased utilization rate of the installed storage capacity\n/SM590000 Advanced Copy Services functions offered across storage systems from separate vendors\n/SM590000 Only one multipath driver is required for attached hosts\nHosts can be connected to Storwize V7000 system using any of the following protocols:\n/SM590000 Fibre Channel (FC)\n/SM590000 Fibre Channel over Ethernet (FCoE)\n/SM590000 Internet Small Computer System Interface (iSCSI)\n/SM590000 iSCSI Extensions over RDMA (iSER)\n/SM590000 Non-Volatile Memory Express (NVMe)\nHosts that connect to the Storwize V7000 system by using fabric switches that use FC or FCoE protocol must be zoned correctly, as described in 3.6, 'SAN configuration planning' on page 50.\nHosts that connect to the Storwize V7000 system with iSCSI protocol must be configured correctly, as described in Chapter 3, 'Planning' on page 43.\nNote: Certain host operating systems can be directly connected to the Storwize V7000 system without the need for FC fabric switches. For more information, see this page of the IBM System Storage Interoperation Center (SSIC).\nFor load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations:\n/SM590000 Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes\n/SM590000 Protection from a host HBA failure (if two HBAs are in use)\n/SM590000 Protection from fabric failures if the host is connected through two HBAs to two separate fabrics\n/SM590000 Provide load balancing across the host HBAs", - "page_start": 339, - "page_end": 339, - "source_file": "sg247938.pdf" - }, - { - "text": "12.2.5 Horizontal scalability: Multiple logical partitions and systems\nThis scenario is similar to the multiple object server scenario where each object server is running on a separate system. In this case, the library server and one or more object servers are installed in separate LPARs on one or more physical systems, as shown in Figure 12-4 on page 291.\n290\nIBM Content Manager OnDemand Guide\nFigure 12-4 Horizontal and vertical scaling with multiple LPARs\nThis scenario is in organizations with large systems, such as AIX or z/OS, that are installed and that have enough available capacity to support the required Content Manager OnDemand workload. One advantage of this configuration is that you can control the priority of work and computer resource distribution to each of the LPARs, such as the number of processors or the processing priority (depending on the computer system/operating system architecture) that is allocated to each of the LPARs. So, for example, load jobs can be assigned a low priority during the day when the focus is on data retrieval and a high priority during the night when the focus is on data loading.\nThis setup supports horizontal scalability by using multiple technologies as appropriate. The main constraint is that clients must have access to all systems through TCP/IP.", - "page_start": 313, - "page_end": 314, - "source_file": "sg246915.pdf" - }, - { - "text": "8.3 N-Port Virtualization ID support\nThe usage model for the Storwize V7000 is based on a two-way active/active node model. This is a pair of distinct control modules that share active/active access for any specific volume. These nodes each have their own Fibre Channel worldwide node name (WWNN). Therefore, ports that are presented from each node have a set of worldwide port names (WWPNs) that are presented to the fabric.\nTraditionally, if one node fails or is removed for some reason, the paths that are presented for volumes from that node go offline. In this case, it is up to the native O/S multipathing software to fail over from using both sets of WWPN to only those that remain online. Although this process is what multipathing software is designed to do, occasionally it can be problematic, particularly if paths are not seen as coming back online for some reason.\nStarting with Storwize V7000 V7.7, the system can be enabled into N_Port ID Virtualization (NPIV) mode. When NPIV mode is enabled on the Storwize V7000 system, ports do not come online until they are ready to service I/O, which improves host behavior around node unpends. In addition, path failures because of an offline node are masked from hosts and their multipathing driver do not need to perform any path recovery.\nWhen NPIV is enabled on Storwize V7000 nodes, each physical WWPN reports up to four virtual WWPNs, as listed in Table 8-1.\nTable 8-1 IBM Spectrum Virtualize NPIV Ports", - "page_start": 340, - "page_end": 340, - "source_file": "sg247938.pdf" - }, - { - "text": "STATIC STRENGTH\nThe static strength requirement is the consideration given to the effect of simple static loads with none of the ramifications of the repetition or cyclic variation of loads. An important reference point in the static strength requirement is the 'limit load' condition. When the aircraft is at the design conliguration, there will be some maximum of load which would be anticipated from the mission requirement of the airplane. For example, a fighter or attack type aircraft, at the design configuration, may encounter a very peak load factor of 7.5 in the accomplishment of its mission. Of course, such an aircraft may be subject to load factors of 3, 4, 5, 6, 1, etc., but no more than 7.5 should be required to accomplish the mission. Thus, the limit load condition is the maximum of loads anticipated in normal operation of the aircraft, Various types of aircraft will have different limit load factors according to the primary mission of the aircraft. Typical values are tabulated below:\nFighter or attack., limi, hi,orror = 7.5. Trainer., limi, hi,orror = 7.5. T ransport, patrol, antisubmarine., limi, hi,orror = 3.0 or 2.5\nhbi'<\nOf course, these examples are quite general and it is important to note that there may be variations according to specific mission requirements.\nSince the limit load is the maximum of the normally anticipated loads, the aircraft structure must withstand this load with no ill effects. Specilicallv, the primary structure of the aircraft should experience no objectionable\n3,26\npermanent deformation when subjected to the limit load. In fact, the components must withstand this load with a positive margin. This requirement implies that the aircraft should withstand successfully the limit load and then return to the original unstressed shape when the load is removed. Obviously, if the aircraft is subjected to some load which is in excess of the limit load, the overstress may incur an objectionable permanent deformation of the primary structure and require replacement of the damaged parts.", - "page_start": 343, - "page_end": 343, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "Which orbiting instrument provides near-continuous full-sky coverage in the hard X-ray/low-energy gamma-ray range?", - "target_page": 1, - "target_passage": "Gamma ray Burst Monitor", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "I. INTRODUCTION\nThe Gamma ray Burst Monitor (GBM) on Fermi is currently the only instrument in orbit providing nearly continuous full sky coverage in the hard X-ray/low energy gamma ray energy range. The Earth occultation technique, used very successfully on BATSE, has been adapted to GBM. An initial catalog of 64 sources is currently being monitored and continuously augmented. At energies above 100 keV, six steady sources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105) and one transient source (XTE J1752-223) have been detected in the first year of observation. We describe the instrument, outline the technique, and present light curves for the seven sources.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "M.H. Finger\nUSRA, National Space Science and Technology Center, Huntsville, AL 35899\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being used for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth occultation technique demonstrated previously by the BATSE instrument on the Compton Gamma Ray Observatory, GBM produces multiband light curves and spectra for known sources and transient outbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage of the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV. We describe the technique and present preliminary results after the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source XTE J1752-223.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "A. Steady Sources\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, and GRS 1915+105 are detected by GBM at energies above 100 keV. We show GBM light curves generated from the Earth occultation analysis in several energy bands with one day resolution for these six sources in Figures 2 - 7.\nTable I gives the fluxes and significances averaged over all the days from Aug. 12, 2008 (the beginning of science operations) to Dec. 15, 2009, approximately 490 days.\nThe Crab (Fig. 2) spectrum in the hard x-ray/low energy gamma-ray region can be described by a broken power law, with the spectrum steepening at 100 keV and then hardening at 650 keV [7, 8]. While the GBMCTIMEdata do not have the spectral resolution\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nFIG. 3: Cen A light curve. Horizontal scale is in modified Julian days.\nto observe these breaks, GBM is able to see significant emission above 300 keV, consistent with the canonical hard spectrum.\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest AGN in hard x-rays/low energy gamma rays. It has a hard spectrum (Γ = 1 . 8) and has been observed at energies > 1 MeV [9]. The GBM results are consistent with this hard spectrum, though GBM does not have the sensitivity to determine if the hard spectrum continues beyond 300 keV or if the spectrum cuts off.\nCyg X-1 (Fig. 4) is a HMXB and one of the first systems determined to contain a black hole. It has been observed to emit significant emission above 100 keV including a power law tail extending out to greater than 1 MeV [10, 11]. The GBM results show significant emission above 300 keV, consistent with the power law tail observed when Cyg X-1 is in its hard state.\nGRS 1915+105 (Fig. 5) is a LMXB with the compact object being a massive black hole. Evidence for emission above 100 keV has been seen previously [12] with BATSE. The GBM light curve integrated over 490 days shows significant emission above 100 keV.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe Gamma ray Burst Monitor is the secondary instrument onboard the Fermi satellite [1, 2]. It con-\neConf C091122\nsists of 12 NaI detectors 5 '' in diameter by 0.5 '' thick mounted on the corners of the spacecraft and oriented such that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 '' in diameter by 5 '' thick located on opposite sides of the spacecraft. None of the GBM detectors have direct imaging capability.\nKnown sources of gamma ray emission can be monitored with non-imaging detectors using the Earth occultation technique, as was successfully demonstrated with BATSE [3, 4]. When a source of gamma rays is occulted by the Earth, the count rate measured by the detector will drop, producing a step-like feature. When the source reappears from behind the Earths limb, the count rate will increase, producing another step. The diameter of the Earth seen from Fermi is ∼ 140 · , so roughly 30% of the sky is occulted by the Earth at any one time. Coupled with the ± 35 · slewing of the pointing direction every orbit, this means that the entire sky is occulted every two orbits. With an altitude of 565 km, a period of 96 minutes, and an orbital inclination of 26 . 5 · , individual occultation steps last for ∼ 10 seconds (Fig. 1).\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFIG. 1: Single Crab occultation step in a single GBM NaI detector. Horizontal scale is in seconds centered on the occultation time. Vertical scale is in measured counts.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0955.pdf" - }, - { - "text": "1. Introduction\nActive galactic nuclei are the most numerous class of identified VHE γ -ray sources. These objects emit non-thermal radiation across ∼ 20 orders of magnitude in energy and rank among the most powerful particle accelerators in the universe. A small fraction of AGN possess strong collimated outflows (jets) powered by accretion onto a supermassive black hole (SMBH). VHE γ -ray emission can be generated in these jets, likely in a compact region very near the SMBH event horizon. Blazars, a class of AGN with jets pointed along the line-of-sight to the observer, are of particular interest in the VHE regime. Approximately 30 blazars, primarily high-frequency-peaked BL Lacs (HBL), are identified as sources of VHE γ -rays, and some are spectacularly variable on time scales comparable to the light crossing time of their SMBH ( ∼ 2 min; [1]). VHE blazar studies probe the environment very near the central SMBH and address a wide range of physical phenomena, including the accretion and jet-formation processes. These studies also have cosmological implications, as VHE blazar data can be used to strongly constrain primordial radiation fields (see the extragalactic background light (EBL) constraints from, e.g., [2, 3]).\nVHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies. The origin of the lower-energy peak is commonly explained as synchrotron emission from the relativistic electrons in the blazar jets. The origin of the higher-energy peak is controversial, but is widely believed to be the result of inverse-Compton scattering of seed photons off the same relativistic electrons. The origin of the seed photons in these leptonic scenarios could be the synchrotron photons themselves, or photons from an external source. Hadronic scenarios are also plausible explanations for the VHE emission, but generally are not favored.\nContemporaneous multi-wavelength (MWL) obser-\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "4. CONNECTION WITH GAMMA-RAYS\nIn general, we find that in the submillimeter, we are observing these blazars at or near the peak of the synchrotron component ( α S ∼ 0), but that Fermi -detected sources have more negative energy spectral indices overall than Fermi -nondetected sources. In Figure 4, we see that while the majority of Fermi blazars are observed on the rising part of the synchrotron component (at lower energies than the peak), all of the objects have very steeply falling γ -ray energy spectral indexes, putting the γ -ray peak at lower energies than the observed Fermi band. Knowing that we are not observing the synchrotron and γ -ray components at analagous points in the spectrum may allow us to better understand the magnetic field in the parsec-scale jet region and the population of external photons that is being upscattered to γ -rays.\nIn Figure 5, the ratio between L γ and νL ν, 1mm reflects the division between BL Lacs and FSRQs as well\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 4: The γ -ray index versus submillimeter index plane. The blazars fall more steeply in the γ -rays than in the submillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, where the blazars are more distributed around α S ∼ 0.\nas the presence of SSC versus ERC. Here, we use submillimeter luminosity as a proxy for jet power, which is correlated with the integrated luminosity of the synchrotron component. Elevated γ -ray luminosity with respect to the synchrotron component (which is often seen in FSRQs) suggests the upscattering of external photons off the synchrotron-emitting electrons. These objects should occupy the upper right of the ratio/jet power plot, and BL Lacs, which generally exhibit components with roughly comparable luminosities, should occupy the lower left. It is clear from the figure, however, that many FSRQs exhibit ratios similar to those of the BL Lacs and vis versa.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "4. CONNECTION WITH GAMMA-RAYS\nSikora et al. [10] report that, during its flaring epochs, 3C 454.3 transitions from its typical FSRQ state to a more BL Lac-like state, where the synchrotron component emits much more strongly compared to the γ -ray component than during its 'low state'. 3C 454.3, which is the highest submillimeter luminosity FSRQ in our sample, would then shift down and to the right in Figure 5 when it enters a flaring period. For the first three months of the Fermi mission, 3C 454.3 was not flaring, which may explain its present location in Figure 5. The three objects for which there is a type discrepancy between CGRaBS and LBAS are all FSRQs (in CGRaBS) and exhibit\neConf C091122\nlow luminosity ratios and high luminosity, which suggest they may be undergoing the same changes as 3C 454.3. A possible interpretation of the elevated luminosity ratios observed in some BL Lacs objects is that there has been a dramatic increase in γ -ray luminosity due to ERC, which would not be reflected in the synchrotron component.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "What is Cyg X-1?", - "target_page": 3, - "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 2: Calculated (a) adsorption energy E ads in eV and (b) change in conductance ∆ G in units of G 0 = 2 e 2 /h for N2, O2, H2O, CO, NH3, and H2S on 3d transition metals occupying a monovacancy (top), divacancy I (middle), and divacancy II (bottom) in a (6,6) carbon nanotube.\nwhere E [ X @M@VC] is the total energy of molecule X on a transition metal atom occupying a vacancy, and E [ X ] is the gas phase energy of the molecule.\nFrom the adsorption energies plotted in Fig. 2(a), we see that the earlier transition metals tend to bind the adsorbates stronger than the late transition metals. The latest metals in the series (Cu and Zn) bind adsorbates rather weakly in the divacancy structures. We also note that O2 binds significantly stronger than any of the three target molecules on Ti, V, Cr, and Mn (except for Cr in divacancy I where H2S is found to dissociate). Active sites containing these metals are therefore expected to be completely passivated if oxygen is present in the background. Further, we find H2O is rather weakly bound to most of the active sites. This ensures that these types of sensors are robust against changes in humidity.\nIn thermodynamic equilibrium [27], the coverage of the active sites follows from\nΘ[ X ] = K [ X ] C [ X ] 1 + ∑ Y K [ Y ] C [ Y ] , (4)\nwhere K = k + /k -is the ratio of forward and backward rate constants for the adsorption reaction,\nK [ X ] = exp [ -E ads [ X ] + TS [ X ] k B T ] . (5)\nIn these expressions C [ X ] is the concentration of species X , S [ X ] is its gas phase entropy and T is the temperature. Experimental values for the gas phase entropies have been taken from Ref. [28].", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "A. Steady Sources\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, and GRS 1915+105 are detected by GBM at energies above 100 keV. We show GBM light curves generated from the Earth occultation analysis in several energy bands with one day resolution for these six sources in Figures 2 - 7.\nTable I gives the fluxes and significances averaged over all the days from Aug. 12, 2008 (the beginning of science operations) to Dec. 15, 2009, approximately 490 days.\nThe Crab (Fig. 2) spectrum in the hard x-ray/low energy gamma-ray region can be described by a broken power law, with the spectrum steepening at 100 keV and then hardening at 650 keV [7, 8]. While the GBMCTIMEdata do not have the spectral resolution\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nFIG. 3: Cen A light curve. Horizontal scale is in modified Julian days.\nto observe these breaks, GBM is able to see significant emission above 300 keV, consistent with the canonical hard spectrum.\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest AGN in hard x-rays/low energy gamma rays. It has a hard spectrum (Γ = 1 . 8) and has been observed at energies > 1 MeV [9]. The GBM results are consistent with this hard spectrum, though GBM does not have the sensitivity to determine if the hard spectrum continues beyond 300 keV or if the spectrum cuts off.\nCyg X-1 (Fig. 4) is a HMXB and one of the first systems determined to contain a black hole. It has been observed to emit significant emission above 100 keV including a power law tail extending out to greater than 1 MeV [10, 11]. The GBM results show significant emission above 300 keV, consistent with the power law tail observed when Cyg X-1 is in its hard state.\nGRS 1915+105 (Fig. 5) is a LMXB with the compact object being a massive black hole. Evidence for emission above 100 keV has been seen previously [12] with BATSE. The GBM light curve integrated over 490 days shows significant emission above 100 keV.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "3 LLMControl Plane Integrity\nIn an unconstrained LLM control plane integrity attack, the adversary A seeks to generate inputs ⃗x = ⃗x 1 , . . . , ⃗x q such that running R M ω ( ⃗x ) generates a transcript for which P (( x 1 , i 1 ) , . . . , ( x q , i q )) = 0 . This attack could be launched by an adversary who wants to maximize inference costs for a victim application using an LLM router.\nA harder setting requires input adaptation, where the adversary is given inputs x 1 , . . . , x q and it must find new inputs ˆ x 1 , . . . , ˆ x q for which the transcript resulting from P ((ˆ x 1 , i 1 ) , . . . , (ˆ x q , i q )) = 0 . There will be some competing constraint, such as that x j and ˆ x j are very similar for each j , or that the outputs y j ← $ R M ω ( x j ) and ˆ y j ← $ R M ω (ˆ x j ) are close. In the routing context, the adversary's goal is to increase the fraction of queries that get routed to the strong model, in order to improve the overall quality of responses, drive up the victim application's inference costs, or both.\n̸\nRelationship to evasion attacks. Evasion attacks [25, 43, 60] against an inference system (also called adversarial examples [32, 48, 49]) would, in our setting, seek to find a small modification ∆ to an input x such that R M ω ( x +∆) = R M ω ( x ) where addition is appropriately defined based on input type (e.g., slight changes to text).\nOur attack setting is not the same. The control plane integrity adversary seeks to maliciously control the inference flow , not necessarily the output of inference. In an unconstrained attack, the adversary does not care what outputs are generated. In the input adaptation attack, the adversary seeks to craft inputs that modify the inference flow yet do not change the responses of the strong underlying LLM to the extent possible. Looking ahead, we will use evasion techniques in our adaptation attacks against learned control plane routers, but, importantly, not the overall inference.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" - }, - { - "text": "A. Steady Sources\nTABLE I: Fluxes and Significance in High Energy Bands\nCrab, 50 - 100 keV.Flux = 1000. Crab, 50 - 100 keV.Error (mCrab) (mCrab) = 3. Crab, 50 - 100 keV.Signif. ( σ ) = 336. Crab, 100 - 300 keV.Flux = 1000. Crab, 100 - 300 keV.Error (mCrab) (mCrab) = 6. Crab, 100 - 300 keV.Signif. ( σ ) = 182. Crab, 300 - 500 keV.Flux = 1000. Crab, 300 - 500 keV.Error (mCrab) (mCrab) = 47. Crab, 300 - 500 keV.Signif. ( σ ) = 21.2. Cen A, 50 - 100 keV.Flux = 72. Cen A, 50 - 100 keV.Error (mCrab) (mCrab) = 4. Cen A, 50 - 100 keV.Signif. ( σ ) = 18. Cen A, 100 - 300 keV.Flux = 108. Cen A, 100 - 300 keV.Error (mCrab) (mCrab) = 7. Cen A, 100 - 300 keV.Signif. ( σ ) = 15. Cen A, 300 - 500 keV.Flux = 42. Cen A, 300 - 500 keV.Error (mCrab) (mCrab) = 47. Cen A, 300 - 500 keV.Signif. ( σ ) = 0.9. Cyg X-1, 50 - 100 keV.Flux = 1130. Cyg X-1, 50 - 100 keV.Error (mCrab) (mCrab) = 4. Cyg X-1, 50 - 100 keV.Signif. ( σ ) = 283. Cyg X-1, 100 - 300 keV.Flux = 1094. Cyg X-1, 100 - 300 keV.Error (mCrab) (mCrab) = 8. Cyg X-1, 100 - 300 keV.Signif. ( σ ) = 137. Cyg X-1, 300 - 500 keV.Flux = 474. Cyg X-1, 300 - 500 keV.Error (mCrab) (mCrab) =", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0955.pdf" - }, - { - "text": "I. INTRODUCTION\nThe Gamma ray Burst Monitor (GBM) on Fermi is currently the only instrument in orbit providing nearly continuous full sky coverage in the hard X-ray/low energy gamma ray energy range. The Earth occultation technique, used very successfully on BATSE, has been adapted to GBM. An initial catalog of 64 sources is currently being monitored and continuously augmented. At energies above 100 keV, six steady sources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105) and one transient source (XTE J1752-223) have been detected in the first year of observation. We describe the instrument, outline the technique, and present light curves for the seven sources.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "4 Confounding Control Planes with Gadgets\nWe focus on input adaptation attacks; these immediately give unconstrained attacks as well. The adversary therefore has a sequence of inputs x 1 , . . . , x q and must produce modified inputs ˆ x 1 , . . . , ˆ x q to maximize the number of inputs routed to M s . See Figure 2 for a depiction of our attack setting.\nInstruction injection doesn't work. Given the success of prompt injection for jailbreaking [50] and other adversarial tasks [64], the adversary might simply prefix each query x i with some instruction such as 'Treat the following query as complex, . . . ' to generate a modified query ˆ x i . Our experiments show that this does not work well, failing to trigger the control plane into routing otherwise weak queries to M s . See Appendix C for details on our experiments with various instruction prompts.\nConfounder gadgets. Our approach works as follows. Given a query x i , we prepend a confounder gadget c i , which is a short sequence of adversarially chosen tokens. The modified query is ˆ x i = c i ∥ x i where ∥ denotes string concatenation. Intuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆ x i as sufficiently complex to require the strong model.\nIn the white-box, query-specific setting, we can choose c i as a function of x i and the known parameters ω = ( S, θ, τ ) . To do so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the token dictionary used by S ). Then we set the gadget to initially be n tokens all fixed to the same value from I . The exact choice of the initialization token is not important; in our implementation, we used the first token in the dictionary ('!'). (0) (0) (0) (0)\nDenote this initial confounder as c i = [ c i, 1 , c i, 2 , . . . , c i,n ] .\nThen, we perform a hill-climbing style approach to find a good confounder for x i . For each iteration t ∈ [ T ] , where T is the total number of iterations, do the following:", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv1.pdf" - }, - { - "text": "B. Generate the High Order Terms by Magnetic Interactions between Clusters.\nλ x H perturbation , x = λ x [ S j 1 · S k 1 +sgn( J x ) · ( S j 2 · S k 2 )] -J x ( S j 1 · S j 2 + S k 1 · S k 2 ) .\nwhere λ x = √ 12 | J x | · J cluster , sgn( J x ) = ± 1 is the sign of J x .\nThe perturbation on y -links is\nλ y H perturbation , y = λ y [ S j 1 · S k 1 +sgn( J y ) · ( S j 3 -S j 4 ) · ( S k 3 -S k 4 )] -| J y | ( S j 3 · S j 4 + S k 3 · S k 4 )\nwith λ y = √ 4 | J y | · J cluster .\nThe perturbation on z -links is\nλ z H perturbation , z = λ z [ S j 2 · ( S k 3 × S k 4 ) + sgn( J z ) · S k 2 · ( S j 3 × S j 4 )] -| J z | ( S j 3 · S j 4 + S k 3 · S k 4 ) .\nwith\nλ z = 4 √ | J z | · J cluster . The entire Hamiltonian H magnetic reads explicitly as,", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0266.pdf" - }, - { - "text": "Question: I have a plot about this big, how much compost do I buy?\n5' x 10' plot, # of Sq Feet = 50 sq ft. 5' x 10' plot, 1/2' Deep - Mulching or Top-dressing = 2.08 cu ft of compost. 5' x 10' plot, 2' Deep - Amending new lawns or gardens = 8.33 cu ft of compost (0.31 cu yd). 10' x 10' plot, # of Sq Feet = 100 sq ft. 10' x 10' plot, 1/2' Deep - Mulching or Top-dressing = 4.17 cu ft of compost. 10' x 10' plot, 2' Deep - Amending new lawns or gardens = 16.66 cu ft of compost (0.62 cu yd). 20 x 50' plot, # of Sq Feet = 1000 sq ft. 20 x 50' plot, 1/2' Deep - Mulching or Top-dressing = 41.7 cu ft of compost. 20 x 50' plot, 2' Deep - Amending new lawns or gardens = 166.7 cu ft of compost (6.2 cu yd). 1 acre, # of Sq Feet = 43,600 sq ft. 1 acre, 1/2' Deep - Mulching or Top-dressing = 1,815 cu ft of compost (67 cu yd). 1 acre, 2' Deep - Amending new lawns or gardens = 7,257 cu ft of compost (268 cu yd)", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Appendix B: Derivation of the Terms Generated by Second Order Perturbation of Inter-cluster Magnetic Interactions\n-λ 2 6 J cluster [ 9 + 9 r 2 16 +2 r P jk ( S j 1 · S j 2 )( S k 1 · S k 2 ) P jk ] = -λ 2 6 J cluster [ 9 + 9 r 2 16 +( r/ 2) τ x j τ x k -r/ 2 -r P jk ( S j 1 · S j 2 + S k 1 · S k 2 ) P jk ] .\nSo we can choose -( r λ 2 ) / (12 J cluster ) = -J x , and include the last intra-cluster S j 1 · S j 2 + S k 1 · S k 2 term in the first order perturbation.\nThe perturbation on x -links is then (not unique),\nλ x H perturbation , x = λ x [ S j 1 · S k 1 +sgn( J x ) · ( S j 2 · S k 2 )] -J x ( S j 1 · S j 2 + S k 1 · S k 2 )\nwith λ x = √ 12 | J x | · J cluster , and r = sgn( J x ) is the sign of J x . The non-trivial terms produced by up to second order perturbation will be the τ x j τ x k term. Note that the last term in the above equation commutes with cluster Hamiltonians so it does not produce second or higher order perturbations.\n9\nSimilarly considering the following perturbation on y -links, λH perturbation = λ [ S j 1 · ( S k 3 -S k 4 ) + r S k 1 · ( S j 3 -S j 4 )]. Following similar procedures we get the second order perturbation from this term", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0266.pdf" - }, - { - "text": "A. Steady Sources\n1E 1740-29 (Fig. 6) is a LMXB very near the Galactic Center. It is a microquasar, and spends most of its time in the low/hard state. Integral observations indicate the presence of a power law tail above 200 keV [13]. The present GBM results are consistent with this high energy emission. In the future, we\neConf C091122\nFIG. 4: Cyg X-1 light curve. Horizontal scale is in modified Julian days.\nFIG. 5: GRS 1915+105 light curve. Horizontal scale is in modified Julian days.\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nTABLE I: Fluxes and Significance in High Energy Bands", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0955.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "What satellite is the Gamma Ray Burst Observatory on?", - "target_page": 1, - "target_passage": " Fermi satellite", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "M.H. Finger\nUSRA, National Space Science and Technology Center, Huntsville, AL 35899\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being used for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth occultation technique demonstrated previously by the BATSE instrument on the Compton Gamma Ray Observatory, GBM produces multiband light curves and spectra for known sources and transient outbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage of the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV. We describe the technique and present preliminary results after the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source XTE J1752-223.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "I. INTRODUCTION\nThe Gamma ray Burst Monitor (GBM) on Fermi is currently the only instrument in orbit providing nearly continuous full sky coverage in the hard X-ray/low energy gamma ray energy range. The Earth occultation technique, used very successfully on BATSE, has been adapted to GBM. An initial catalog of 64 sources is currently being monitored and continuously augmented. At energies above 100 keV, six steady sources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105) and one transient source (XTE J1752-223) have been detected in the first year of observation. We describe the instrument, outline the technique, and present light curves for the seven sources.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe Gamma ray Burst Monitor is the secondary instrument onboard the Fermi satellite [1, 2]. It con-\neConf C091122\nsists of 12 NaI detectors 5 '' in diameter by 0.5 '' thick mounted on the corners of the spacecraft and oriented such that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 '' in diameter by 5 '' thick located on opposite sides of the spacecraft. None of the GBM detectors have direct imaging capability.\nKnown sources of gamma ray emission can be monitored with non-imaging detectors using the Earth occultation technique, as was successfully demonstrated with BATSE [3, 4]. When a source of gamma rays is occulted by the Earth, the count rate measured by the detector will drop, producing a step-like feature. When the source reappears from behind the Earths limb, the count rate will increase, producing another step. The diameter of the Earth seen from Fermi is ∼ 140 · , so roughly 30% of the sky is occulted by the Earth at any one time. Coupled with the ± 35 · slewing of the pointing direction every orbit, this means that the entire sky is occulted every two orbits. With an altitude of 565 km, a period of 96 minutes, and an orbital inclination of 26 . 5 · , individual occultation steps last for ∼ 10 seconds (Fig. 1).\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFIG. 1: Single Crab occultation step in a single GBM NaI detector. Horizontal scale is in seconds centered on the occultation time. Vertical scale is in measured counts.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0955.pdf" - }, - { - "text": "2. VERITAS\nVERITAS, a stereoscopic array of four 12-m atmospheric-Cherenkov telescopes located in Arizona, is used to study VHE γ -rays from a variety of astrophysical sources [4]. VERITAS began scientific observations with a partial array in September 2006 and has routinely observed with the full array since September 2007. The performance metrics of VERITAS include an energy threshold of ∼ 100 GeV, an energy resolution of ∼ 15%, an angular resolution of ∼ 0.1 · , and a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours 1 . VERITAS has an active maintenance program (e.g. frequent mirror recoating and alignment) to ensure its continued high performance over time, and an upgrade improving both the camera (higher quantum-efficiency PMTs) and the trigger system has been proposed to the funding agencies.\n1 A VERITAS telescope was relocated during Summer 2009, increasing the array's sensitivity by a factor ∼ 1.3.\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "VERITAS Observations of Blazars\nW. Benbow for the VERITAS Collaboration\nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, USA\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is used to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is currently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration's Key Science Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class of identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which are blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE exposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including 8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected results are presented.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "4. CONNECTION WITH GAMMA-RAYS\nIn general, we find that in the submillimeter, we are observing these blazars at or near the peak of the synchrotron component ( α S ∼ 0), but that Fermi -detected sources have more negative energy spectral indices overall than Fermi -nondetected sources. In Figure 4, we see that while the majority of Fermi blazars are observed on the rising part of the synchrotron component (at lower energies than the peak), all of the objects have very steeply falling γ -ray energy spectral indexes, putting the γ -ray peak at lower energies than the observed Fermi band. Knowing that we are not observing the synchrotron and γ -ray components at analagous points in the spectrum may allow us to better understand the magnetic field in the parsec-scale jet region and the population of external photons that is being upscattered to γ -rays.\nIn Figure 5, the ratio between L γ and νL ν, 1mm reflects the division between BL Lacs and FSRQs as well\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 4: The γ -ray index versus submillimeter index plane. The blazars fall more steeply in the γ -rays than in the submillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, where the blazars are more distributed around α S ∼ 0.\nas the presence of SSC versus ERC. Here, we use submillimeter luminosity as a proxy for jet power, which is correlated with the integrated luminosity of the synchrotron component. Elevated γ -ray luminosity with respect to the synchrotron component (which is often seen in FSRQs) suggests the upscattering of external photons off the synchrotron-emitting electrons. These objects should occupy the upper right of the ratio/jet power plot, and BL Lacs, which generally exhibit components with roughly comparable luminosities, should occupy the lower left. It is clear from the figure, however, that many FSRQs exhibit ratios similar to those of the BL Lacs and vis versa.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "4. CONNECTION WITH GAMMA-RAYS\nSikora et al. [10] report that, during its flaring epochs, 3C 454.3 transitions from its typical FSRQ state to a more BL Lac-like state, where the synchrotron component emits much more strongly compared to the γ -ray component than during its 'low state'. 3C 454.3, which is the highest submillimeter luminosity FSRQ in our sample, would then shift down and to the right in Figure 5 when it enters a flaring period. For the first three months of the Fermi mission, 3C 454.3 was not flaring, which may explain its present location in Figure 5. The three objects for which there is a type discrepancy between CGRaBS and LBAS are all FSRQs (in CGRaBS) and exhibit\neConf C091122\nlow luminosity ratios and high luminosity, which suggest they may be undergoing the same changes as 3C 454.3. A possible interpretation of the elevated luminosity ratios observed in some BL Lacs objects is that there has been a dramatic increase in γ -ray luminosity due to ERC, which would not be reflected in the synchrotron component.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "Observations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation with GBM\nG.L. Case, M.L. Cherry, J. Rodi Dept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "When in present-day Poland did the first shift away from earlier ancestry occur?", - "target_page": 3, - "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Article\nFig. 3 | Time transects across six geographical regions in Europe.\na -f , Ancestry change visualized over a time transect spanning from the Bronze Age to the present day in Poland ( a ), southeastern Europe ( b ), central Europe ( c ), Italy ( d ), Britain and Ireland ( e ) and Scandinavia ( f ). The maps show sample locations of all available ancient genomes with at least 0.5× coverage from\nmedieval individuals ( P ≪ 1 × 10 -32 ). Instead, the majority of individuals from medieval Poland can be modelled only as a mixture of ancestries related to Roman Iron Age Lithuania, which is similar to ancestries of individuals from middle to late Bronze Age Poland (44%, 95% confidence interval 36-51%), an ancestry component related to Hungarian Scythians or Slovakian La Tène individuals (49%, 95% confidence interval 41-57%) and potentially a minority component of ancestry related to Sarmatians from the Caucasus ( P = 0.13) (Fig. 2c). Four out of twelve individuals from medieval Poland, three of whom are from the late Viking Age 6 , carried detectable Scandinavian-related ancestry. Some of the ancestry detected in individuals from later medieval Poland may have persisted during the late first millennium CE in the cremating portion of the population, but regardless, this points to large-scale ancestry transformation in medieval Poland (Fig. 3a). Future data could shed light on the extent to which this reflects the influence of groups speaking Slavic languages in the region.\n122\n| Nature | Vol 637 | 2 January 2025\nthese regions (Supplementary Table 1). Their ancestry is shown on the same MDS model as in Fig. 2a for each time period. For each geographic region, the early medieval period is highlighted in orange and the area in the MDS corresponding to Scandinavian and central European ancestries is highlighted in an orange box.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "Expansions of Scandinavian-like ancestry\nWe assembled time transects using available aDNA data across several geographical regions in Europe, and infer their ancestry using a model with the EIA or Roman Iron Age sources previously defined (shown in Fig. 2a). Our modelling provides direct evidence of individuals with ancestry originating in northern Germany or Scandinavia appearing across Europe as early as the first century CE (Figs. 2b,c and 3 and Supplementary Table 3).\nIn the region of present-day Poland, our analysis suggests several clear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 BCE to 1000 BCE), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures 55 (Fig. 3a). Second, in the first to fifth century CE, individuals associated with Wielbark culture 5,12 show an additional strong shift away from the preceding Bronze Age groups, and can only be modelled with a >75% component attributed to the EIA Scandinavian Peninsula. Multiple individuals, especially from earlier Wielbark cemeteries, have approximately 100%\nFig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.\na , Source groups used for qpAdm modelling of early medieval Europe. MDS is computed jointly with individuals from later periods using pairwise outgroup f 3 statistics (outgroup: Han Chinese people). These are calculated using Twigstats on Relate genealogies with a cut-off of 1,000 generations. The geographical map shows sampling locations of these individuals. b , The genetic structure of ancient groups predominantly from early medieval contexts shown on the same MDS as in a . The magnified inset shows an MDS computed without Twigstats on the same samples as the Twigstats MDS and focusing on early medieval or later individuals. c , Ancestry models of early medieval (EM) groups across Europe computed using qpAdm. Sample sizes are", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nIn present-day Slovakia, individuals associated with the Iron Age La Tène period appear close to Hungarian Scythians in the two dimensions of our MDS analysis, and are modelled as a mixture of central and eastern European ancestry. However, a first-century CE burial of a 50-60-year-old woman from Zohor is modelled only with Scandinavian-related ancestry, providing evidence of ancestry related to the Scandinavian EIA appearing southwest of the range of the Wielbark archaeological complex 5,57 (Fig. 3b). Later early medieval individuals from Slovakia have partial Scandinavian-related ancestry, providing evidence for the integration between expanding and local groups.\nNearby, in present-day Hungary, we observe Scandinavian-related ancestry components in several burials dating to the sixth century CE associated with Longobards (Longobard_earlyMED(I)) 10 (Fig. 2c). This is consistent with the original study 10 , which reported affinity to present-day groups from northwestern Europe (GBR, CEU and FIN in the 1000 Genomes Project (1000GP)) 10 but which we can resolve with\nhigher resolution using earlier genomes. Several other individuals from these Longobard burials (Longobard_earlyMED(II)) show no detectable ancestry from northern Europe and, instead, are more closely related to Iron Age groups in continental central Europe, putatively representing descendants of local people buried in a Longobard style. Our results are consistent with attestations that the Longobards originated in the areas of present-day northern Germany or Denmark, but that by the sixth century CE they incorporated multiple different cultural identities, and mixed ancestries. Present-day populations of Hungary do not appear to derive detectable ancestry from early medieval individuals from Longobard contexts, and are instead more similar to Scythian-related ancestry sources (Extended Data Fig. 6), consistent with the later impact of Avars, Magyars and other eastern groups 58 .", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nIn southern Germany, the genetic ancestry of individuals from early medieval Bavaria probably associated with the historical Germanic-language-speaking Baiuvarii 59 cannot be modelled as deriving ancestry solely from earlier groups in Iron Age central Germany ( P ≪ 1 × 10 -36 ). The Baiuvarii probably appeared in the region in the fifth century CE 59 , but their origins remain unresolved. Our current best model indicates a mixture with ancestry derived from EIA Peninsular Scandinavia and central Europe, suggesting an expansion of Scandinavian-related ancestry producing a regional ancestry shift (Figs. 2c and 3c).\nIn Italy, southward expansions of northern and central European ancestries appear by the Late Antiquity (approximately fourth century CE), where a clear diversification of ancestry can be observed compared with preceding time periods (Fig. 3d). However, no individuals with near 100% Scandinavian ancestry can be observed in the sampling data available so far.\nIn Britain, the ancestries of Iron Age and Roman individuals form a tight cluster in our MDS analysis (Fig. 3e), shifted relative to available preceding Bronze Age individuals from Ireland and Orkney, and adjacent to, but distinct from, available individuals in Iron Age and Roman central Europe. However, two first- to second-century CE burials from a Roman military fortress site in Austria (Klosterneuburg) 5 carry ancestry that is currently indistinguishable from Iron Age or Roman populations of Britain, to the exclusion of other groups (qpWave cladality P = 0.11). One option is that they had ancestry from Britain; alternatively, currently unsampled populations from western continental Europe carried ancestries similar to Iron Age southern Britain.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "2. Estimating an incidence trend from treatment data\n23 This shift does not appear to be related to the reduction in heroin supply occurring around 2010/11. As Appendix 1 demonstrates, the pattern emerges far earlier.\nNew opiate and crack-cocaine users: characteristics and trends\n28\nFigure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005 and 2013, by age of individual at first presentation.\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age profile throughout. Rises in average age of initiation have also been reported recently in cohorts of Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible explanations.\n There is a genuine shift towards new initiates being older, and for them to present to treatment much faster than in previous years.\n There is a consistent, but small number of individuals who mis-report their age of onset when attending treatment i.e. who report that they have only been using opiates/crack for a short period when in fact they have been using for a far longer period, and that this is starting to really bias the numbers for recent cohorts because attendees from the original epidemic are becoming smaller.\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of older initiates, although mis-reporting may also explain that phenomenon. Either way though, as this analysis has made clear throughout, absolute numbers of new OCUs appear to be small probably fewer than 10,000 per annum and the numbers of those involved with crime will be smaller still. In addition, despite a flattening in the probable trend in new users, there is currently no sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to resume, though clearly it remains important to monitor the situation.\nNew opiate and crack-cocaine users: characteristics and trends\n29", - "page_start": 27, - "page_end": 28, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Influx into pre-Viking Age Scandinavia\nIn EIA Scandinavia (<500 CE), we find evidence for broad genetic homogeneity. Specifically, individuals from Denmark (100 CE-300 CE) were indistinguishable from contemporary people in the Scandinavian Peninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry already in the eighth century CE (Late Iron Age/early Viking Age) on Zealand (present-day Denmark) for which a 100% EIA ancestry model is rejected ( P = 1 × 10 -17 using Twigstats; P = 7.5 × 10 -4 without). This shift in ancestry persists among later Viking Age groups in Denmark, where all groups are modelled with varying proportions of ancestry related to Iron Age continental groups in central Europe (Figs. 3f and 4c). A non-parametric MDS of Viking Age individuals suggests that variation between individuals forms a cline spanning from the EIA Scandinavian Peninsula individuals to ancestry characteristic of central Europe (Fig. 4e). The observed shift in ancestry in Denmark cannot be confounded by potentially earlier unknown gene flow into Iron Age source groups in Austria, France and Germany, but such gene flow could affect the exact ancestry proportions.\nThese patterns are consistent with northward expansion of ancestry, potentially starting before the Viking Age, into the Jutland peninsula and Zealand island towards southern Sweden. The geographical origin of this ancestry is currently difficult to discern, as the available samples from Iron Age central Europe remain sparse. The timing of this expansion is constrained only by the samples available: this ancestry is not observed in individuals from the Copenhagen area of Denmark (around 100 CE-300 CE) 6 , an individual from the southern tip of Sweden (around 500 CE) 16 , individuals from the Sandby Borg massacre site on Öland in present-day Sweden (around 500 CE) 7 and 31 individuals from the mid-eighth century Salme ship burials in present-day Estonia (Extended Data Fig. 9), who probably originated in central Sweden 6 . Therefore, this ancestry transformation most likely postdated these individuals in each particular region and mostly occurred in the second half of the first millennium CE.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "High-resolution genomic history of early medieval Europe\nAncient genome sequencing has revolutionized our ability to reconstruct expansions, migrations and admixture events in the ancient past and understand their impact on human genetic variation today. However, tracing history using genetic ancestry has remained challenging, particularly in historical periods for which the richest comparative information from history and archaeology often exists. This is because ancestries in many geographical regions are often so similar as to be statistically indistinguishable with current approaches. One example is northern and central Europe since the start of the Iron Age around 500 BCE, a period for which many long-standing questions remain, such as the nature of large-scale patterns of human migration during the fourth to sixth centuries CE, their impact on the Mediterranean world and later patterns of human mobility during the Viking Age (around 750-1050 CE).\nSeveral recent studies have documented substantial mobility and genetic diversity in these time periods, suggesting stable population structure despite high mobility 5 , and have revealed genetic variation in Viking Age Scandinavia 6-8 , early medieval England 3,9 , early medieval Hungary 10,11 and Iron Age and medieval Poland 12 . However, previous studies mostly used large modern cohorts to study ancestry change through time and space. This is because the differentiation between Iron Age groups in central and northern Europe is an order of magnitude lower (fixation index ( F ST) = 0.1-0.7%; Extended Data Fig. 1) than, for example, the more commonly studied hunter-gatherer, early farmer and steppe-pastoralist groups that shaped the ancestry landscape of\nStone Age and Bronze Age Europe 13-16 ( F ST = 5-9% (refs. 13,17)). Modern populations provide more power to detect differences, but their genetic affinity to ancient individuals may be confounded by later gene flow, that is, after the time of the ancient individual(s) 18 . The most principled approach is thus to build ancestry models in which source and 'outgroup/reference' populations are older than, or at least contemporary with, the target genome or group that we are trying to model 18 . However, this has been challenging, due to the limited statistical power offered by the thousands-fold lower sample sizes and reduced sequence quality of ancient genomes.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed3.pdf" - }, - { - "text": "Viking Age mobility into Scandinavia\nPrevious studies had suggested a major influx of ancestry related to Britain into Viking Age Scandinavia 6,7 . Although we detect this ancestry in some individuals (7 individuals in Norway, 14 in Denmark and 14 in Sweden), including some individuals whose ancestry appears to be entirely derived from Iron Age Britain, its overall impact appears reduced compared with previous reports. Our analysis indicates a proportionally larger impact of ancestry from Iron Age Britain in northern Norway, with southern Scandinavia predominantly influenced by continental central European ancestries (Fig. 4d). We hypothesize that our estimates of ancestry from Britain are reduced relative to previous studies because ancestry related to Britain and continental central Europe may have been indistinguishable. This could be due to a lack of statistical power to distinguish these closely related sources with standard methods, as well as through potential biases introduced by using modern surrogate populations that have since been influenced by later gene flow (such as gene flow into Britain). We illustrate this by replicating the analyses previously described 6,7 (Extended Data Fig. 8).\nSimilarly, a previous study has suggested that individuals at sites such as Kärda in southern Sweden carried ancestry from southern Europe 6 . In our models, two Kärda individuals fit with central European-related ancestry, but none of the individuals has a substantial proportion of ancestry related to southern European sources (Extended Data Fig. 9). Instead, we detect ancestry from southern European sources in only three individuals from Scandinavia, and in relatively small proportions (Fig. 4a).\nInterestingly, we detect ancestry from Bronze and Iron Age sources from Eastern Europe (present-day Lithuania and Poland), concentrated in southeastern parts of Sweden, particularly the island of Gotland (14 individuals; Fig. 4a). This is consistent with previous genetic studies 6,7 . We find that this ancestry is enriched in male individuals (Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. The closest match tends to be Roman Iron Age Lithuanian genomes associated with Balts, which would be consistent with mobility across the Baltic Sea, but we caution that the geographical representation of available genomes is still limited.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\n| Nature | Vol 637 | 2 January 2025\nthat of established groups, we focused on the island of Öland in southeast Sweden, where 23 individuals for whom we could reconstruct ancestry portraits also had associated strontium stable isotope data 66 . Strontium isotope data from dental enamel reflect the geology of the region where an individual grew to maturity, and there are considerable differences in expectations between Öland and many other regions in northern Europe. The full range of strontium isotope ratios in 109 individuals show two modes, a majority group with low ratios and a second minority group with high ratios falling outside the expected range of local fauna (Fig. 4b). Among 23 individuals with genomes in our data, all 5 individuals with 100% ancestry relating to central Europe\n(including one with ancestry related to Britain) are part of the majority strontium values, consistent with them having grown up locally. By contrast, the six most clearly non-local individuals based on the stable isotopes all have 50% or more EIA Scandinavian Peninsula-related ancestry, although three individuals with wholly EIA Scandinavian Peninsula-related ancestry also had local values. This suggests that the presence of central European-related ancestry was not a transient phenomenon, but an ancestry shift that occurred at some point after about 500 CE, the period to which individuals from the massacre site at Sandby Borg ringfort on Öland were dated; these individuals all have strictly EIA Scandinavian-related ancestry. Indeed, one hypothesis is that the massacre at Sandby Borg could represent conflict associated with movements of people that contributed to later ancestry change, although other scenarios are possible and further synthesis of biomolecular and archaeological data is necessary to test this hypothesis.", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nTwigstats substantially improves models of admixture between ancestries from Iron Age Britain and northern Europe in early medieval England 9 , halving standard errors from 9% with SNPs to 4% when using time stratification (point estimates 80% and 79% Iron Age Britain-related ancestry, respectively). We used this improved resolution to demonstrate that an earlier Roman individual (6DT3) dating to approximately second to fourth century CE from the purported gladiator or military cemetery at Driffield Terrace in York (Roman Eboracum ), England 60 , who was previously identified as an ancestry outlier 61,62 , specifically carried approximately 25% EIA Scandinavian Peninsula-related ancestry (Fig. 2c). This documents that people with Scandinavian-related ancestry already were in Britain before the fifth century CE, after which there was a substantial influx associated with Anglo-Saxon migrations 9 . Although it is uncertain whether this individual was a gladiator or soldier, individuals and groups from northern Europe are indeed recorded in Roman sources both as soldiers and as enslaved gladiators 63,64 .\nAcross Europe, we see regional differences in the southeastern and southwestern expansions of Scandinavian-related ancestries. Early medieval groups from present-day Poland and Slovakia carry specific ancestry from one of the Scandinavian EIA groups-the one with individuals primarily from the northern parts of Scandinavia in the EIA-with no evidence of ancestry related to the other primary group in more southern Scandinavia (Fig. 2d). By contrast, in southern and western Europe, Scandinavian-related ancestry either derives from\nEIA southern Scandinavia-as in the cases of the probable Baiuvarii in Germany, Longobard-associated burials in Italy and early medieval burials in southern Britain-or cannot be resolved to a specific region in Scandinavia. If these expansions are indeed linked to language, this pattern is remarkably concordant with the main branches of Germanic languages, with the now-extinct eastern Germanic spoken by Goths in Ukraine on the one hand, and western Germanic languages such as Old English and Old High German recorded in the early medieval period on the other hand.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "How many clusters has the Scandinavian peninsula been divided into thanks to Twigstats?", - "target_page": 12, - "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Article\nClustering using qpwave. To overcome challenges with hand-curating source groups used in qpAdm modelling, we follow ref. 5 and run qpwave using Twigstats between pairs of ancient individuals. We use Han Chinese individuals from Beijing and five European populations from the 1000GP as reference groups. This approach tests whether two\nindividuals form a clade with respect to reference groups. The reason why this is a principled approach despite the 1000GP groups post-dating the ancient individuals is that if a group of ancient individuals are truly homogeneous, they will be so also with respect to later individuals.\nWe then define clusters by running UPGMA (unweighted pair group method with arithmetic mean) on -log10[ P values] obtained from qpwave between all pairs of individuals and cut the resulting dendrogram at a height corresponding to a P value of 0.01. We then further subdivide clusters by requiring all samples to be within 500 years of the mean cluster age.\nTo choose the source groups shown in Fig. 2a and Extended Data Fig. 1d, we run this algorithm on samples from Iron and Roman Age Europe (Supplementary Table 1). We retain groups that have at least three individuals and, therefore, exclude clusters of size one or two.\nThis approach results in two clusters in the Scandinavian Peninsula, approximately separating northern from southern Scandinavia, three clusters in Poland and Ukraine that separate samples temporally between the early and later Bronze Age, a cluster combining the Hungarian Scythian and Slovakian La Tène-associated individuals, and a cluster each for Iron and Roman Age Portugal, Italy and Lithuania. In present-day Austria, Germany and France, this approach identifies three clusters, with each cluster spanning multiple archaeological sites in different countries, indicating genetic diversity in this region in the first millennium CE. Encouragingly, these clusters separate in our non-parametric MDS analysis (Fig. 2a), indicating that we are capturing real genetic differences between groups using this approach.", - "page_start": 10, - "page_end": 11, - "source_file": "pubmed3.pdf" - }, - { - "text": "Influx into pre-Viking Age Scandinavia\nIn EIA Scandinavia (<500 CE), we find evidence for broad genetic homogeneity. Specifically, individuals from Denmark (100 CE-300 CE) were indistinguishable from contemporary people in the Scandinavian Peninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry already in the eighth century CE (Late Iron Age/early Viking Age) on Zealand (present-day Denmark) for which a 100% EIA ancestry model is rejected ( P = 1 × 10 -17 using Twigstats; P = 7.5 × 10 -4 without). This shift in ancestry persists among later Viking Age groups in Denmark, where all groups are modelled with varying proportions of ancestry related to Iron Age continental groups in central Europe (Figs. 3f and 4c). A non-parametric MDS of Viking Age individuals suggests that variation between individuals forms a cline spanning from the EIA Scandinavian Peninsula individuals to ancestry characteristic of central Europe (Fig. 4e). The observed shift in ancestry in Denmark cannot be confounded by potentially earlier unknown gene flow into Iron Age source groups in Austria, France and Germany, but such gene flow could affect the exact ancestry proportions.\nThese patterns are consistent with northward expansion of ancestry, potentially starting before the Viking Age, into the Jutland peninsula and Zealand island towards southern Sweden. The geographical origin of this ancestry is currently difficult to discern, as the available samples from Iron Age central Europe remain sparse. The timing of this expansion is constrained only by the samples available: this ancestry is not observed in individuals from the Copenhagen area of Denmark (around 100 CE-300 CE) 6 , an individual from the southern tip of Sweden (around 500 CE) 16 , individuals from the Sandby Borg massacre site on Öland in present-day Sweden (around 500 CE) 7 and 31 individuals from the mid-eighth century Salme ship burials in present-day Estonia (Extended Data Fig. 9), who probably originated in central Sweden 6 . Therefore, this ancestry transformation most likely postdated these individuals in each particular region and mostly occurred in the second half of the first millennium CE.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Extended Data Fig. 7 | Ancestry estimates stratified by genetic sex. a , Map\nshowing ancestry carried by each Scandinavian Viking age individual. b , Ancestry proportions across individuals grouped by Latitude and genetic sex. c , Odds ratio and p-values calculated using a two-sided Fisher's exact test on the number of males and females carrying each ancestry in Viking Age Denmark, Sweden, Norway, Iceland, and Gotland. d , F4 values of the form f 4(Scandinavian_Peninsula_ EIA(I), alternative source group, males in Viking group, females in Viking group) computed using all SNPs and Twigstats. A significantly positive value is\nevidence of attraction of females with pop2 or males with Scandinavian_ Peninsula_EIA(I). Number of males and females is shown in each facet title and we restrict to groups with at least four males and females. We plot one standard error. e , Map showing 'farflung' Viking individuals grouped by ancestry and genetic sex. In contrast to Fig. 4a and d where we showed results for the 'best' qpAdm model, here in panels a , b, c, and e , an individual is assigned an ancestry group, if it has any accepted model (p > 0.01) where that ancestry features.", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed3.pdf" - }, - { - "text": "Influx into pre-Viking Age Scandinavia\nTo assess the full extent of the impact of this ancestry influx into Scandinavia, we next aimed to understand the ancestry of individuals in Scandinavia during the Viking Age. Previous studies have suggested that there was a diversity of ancestries in Scandinavia during this period 6,7,65 , due to increased maritime mobility, but have not reported per-individual ancestry estimates based on preceding ancestry. We analysed each individual's ancestry using a rotational qpAdm scheme (Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which showed increased power in distinguishing models when restricted to recent coalescences with Twigstats (more than 80% of accepted one-source models in Twigstats were also accepted one-source models using all SNPs, compared with less than 17% for the inverse).\nWe investigated regional differences in non-local ancestry across Scandinavia. In Denmark, 25 out of 53 Viking Age individuals had detectable ( zscore > 1) central European-related ancestry (CentralEurope. IronRoman or Portugal.IronRoman) in their best accepted qpAdm models. In Sweden 20 out of 62 individuals had detectable central European-related ancestry, concentrated almost entirely in southern regions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed in only 2 out of 24 individuals, indicating a wide-ranging impact of incoming ancestry in southern Scandinavia and suggesting more\nNature | Vol 637 | 2 January 2025 |\n123", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Expansions of Scandinavian-like ancestry\nWe assembled time transects using available aDNA data across several geographical regions in Europe, and infer their ancestry using a model with the EIA or Roman Iron Age sources previously defined (shown in Fig. 2a). Our modelling provides direct evidence of individuals with ancestry originating in northern Germany or Scandinavia appearing across Europe as early as the first century CE (Figs. 2b,c and 3 and Supplementary Table 3).\nIn the region of present-day Poland, our analysis suggests several clear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 BCE to 1000 BCE), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures 55 (Fig. 3a). Second, in the first to fifth century CE, individuals associated with Wielbark culture 5,12 show an additional strong shift away from the preceding Bronze Age groups, and can only be modelled with a >75% component attributed to the EIA Scandinavian Peninsula. Multiple individuals, especially from earlier Wielbark cemeteries, have approximately 100%\nFig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.\na , Source groups used for qpAdm modelling of early medieval Europe. MDS is computed jointly with individuals from later periods using pairwise outgroup f 3 statistics (outgroup: Han Chinese people). These are calculated using Twigstats on Relate genealogies with a cut-off of 1,000 generations. The geographical map shows sampling locations of these individuals. b , The genetic structure of ancient groups predominantly from early medieval contexts shown on the same MDS as in a . The magnified inset shows an MDS computed without Twigstats on the same samples as the Twigstats MDS and focusing on early medieval or later individuals. c , Ancestry models of early medieval (EM) groups across Europe computed using qpAdm. Sample sizes are", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "Viking Age expansion from Scandinavia\nTraditionally, historical perspectives on what is now often referred to as the Viking diaspora placed an emphasis on the movements and settlements of population groups from various parts of Scandinavia 67 . Our explorative MDS analysis again indicates mixed ancestries related to the Scandinavian EIA, with regional differences that point to varied local admixture (Fig. 4e and Extended Data Fig. 10).\nIn Britain, most of the individuals recovered from the two late Viking Age mass graves identified at Ridgeway Hill, Dorset, and St John's\nCollege, Oxford 6 , show ancestries typical of those seen in Viking Age southern Scandinavia (Fig. 4f). Further west, North Atlantic Viking Age individuals in the Faroe Islands, Iceland and Greenland carry ancestry from the Scandinavian Peninsula, with several individuals showing the continental central Europe-related ancestry signal found in southern Scandinavia (Fig. 4f) and others who share substantial ancestry with Iron Age Britain. In contrast to previous hypotheses 68 , we found a marginal enrichment of ancestry related to Britain and Ireland in men (15 out of 17 men and 3 out of 6 women with at least one accepted model involving Iron or Roman Age Britain as source; Fisher's exact test P = 0.089) (Extended Data Fig. 7c,e). However, sampling of additional individuals to improve distinction between early English- and Norse-related ancestries would be required to fully test this hypothesis.\nIn eastern Europe, we observe EIA Scandinavian ancestries in a Viking Age burial from Ukraine, and these ancestries are overrepresented in Viking Age burials from present-day Russia. At Staraya Ladoga in western Russia, we observe several individuals with EIA Scandinavian Peninsula-related ancestry and at least one individual dated to the eleventh century with apparent ancestry related to Iron Age Britain. The relative absence of Iron Age central European ancestry, which was largely restricted to southern Scandinavia during the Viking Age, is thus indicative that these individuals may have originated in the central/ northern parts of Sweden or Norway, where Viking Age individuals show the most similar ancestry profiles to them.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nFig. 4 | Ancestry in the Viking world. a , Map showing ancestry carried by Scandinavian Viking Age individuals as inferred using the best-fitting qpAdm model. These are chosen by either choosing the one-source model with largest P value and P > 0.01 or the two-source model with the largest P value and P > 0.01. Extended Data Fig. 7 shows the same map with all accepted models. b , Stable isotope data indicating the geology of childhood origin. The histogram shows the ratio of strontium isotopes 87 to 86 measured in 109 individuals in Öland 69 . For individuals included in our ancestry modelling, we plot Iron Age central European-related ancestry against their stable isotope values (grey circles, r = -0.39, P = 0.075). Shared area corresponds to the 95% confidence band\naround the regression line. c , The ancestry shift observed in Viking Age Danish groups using qpAdm on all SNPs or Twigstats. We show the best one-source and all two-source models with P > 0.05. For models with P < 0.05, the -log10[ P value] is shown under the plot. Sample sizes for each group are shown in brackets. d , The ancestry proportion across Viking Age individuals in Denmark, Sweden and Norway grouped by latitude. e , Viking Age genetic variation (grey circles) visualized on the same MDS as in Fig. 2a,b. f , The best-fitting qpAdm ancestry model for far-flung Viking individuals. Detailed models for all individuals are shown in Extended Data Figs. 9 and 10. In c and f , we show one s.e. Rotating qpAdm sources are marked in bold in the key.\ncontinuity from the EIA in Norway and northern Sweden (Fig. 4a). When considered collectively, the individuals who show evidence of central European-related ancestry are mostly observed in regions historically within the Danish sphere of influence and rule. Currently, no such individuals, for example, are noted in eastern central Sweden, which was a focus of regional power of the Svear (Fig. 4a). The difference in distribution could suggest that the central European-related ancestry was more common in regions dominated by the historical Götar and groups inhabiting the lands on the borders of the Danish kingdom.\nTo test the extent to which the variation in ancestry was consistent with mobility during the lifetime of the individuals or, alternatively,\n124", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" - }, - { - "text": "Expansions of Scandinavian-like ancestry\nshown in black boxes. Sources are highlighted in a and marked as bold in the key, and were used in a rotational qpAdm scheme. For each target group, we remove models with infeasible admixture proportions (falling outside [0, 1]) and use a Twigstats cut-off of 1,000 generations. All models satisfy P > 0.01, unless a -log10[ P value] is shown next to the model. If models satisfy P > 0.05, we show all such models; otherwise, we show only the model with the largest P value. d , The ancestry proportion derived from EIA Scandinavia in groups with a non-zero component of this ancestry. We show groups modelled in c that have a feasible model ( P > 0.01). In c , d , we show one s.e. BA, Bronze Age; CNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking Age; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark archaeological complex has been linked to the later Chernyakhov culture to the southeast and to early Goths, an historical Germanic group that flourished in the second to fifth centuries CE 56 . Our modelling supports the idea that some groups that probably spoke Germanic languages from Scandinavia expanded south across the Baltic into the area between the Oder and Vistula rivers in the early centuries CE, although whether these expansions can be linked specifically with historical Goths is still debatable. Moreover, since a considerable\nproportion of Wielbark burials during this period were cremations, the possible presence of individuals with other ancestries cannot be strictly rejected if they were exclusively cremated (and are therefore invisible in the aDNA record).\nA previous study could not reject continuity in ancestry from the Wielbark-associated individuals to later medieval individuals from a similar region 12 . With the improved power of Twigstats, models of continuity are strongly rejected, with no one-source model of any preceding Iron Age or Bronze Age group providing a reasonable fit for the\nNature | Vol 637 | 2 January 2025 |\n121", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "Conclusions\nOur approach, Twigstats, transfers the power advantage of haplotypebased approaches to a fully temporal framework, which is applicable to f -statistics and enables previously unavailable unbiased and time-stratified analyses of admixture. We demonstrated that Twigstats enables fine-scale quantitative modelling of ancestry proportions, revealing wide-ranging ancestry changes that affect northern and central Europe during the Iron, Roman and Viking ages. We reveal evidence of the southward and/or eastward expansion of individuals who probably spoke Germanic languages and who had Scandinavian-related ancestry in the first half of the first millennium CE. We note that 'Scandinavian-related' in this context relates to the ancient genomes available, and so it is entirely possible that these processes were driven, for example, from regions in northern-central Europe. This could be consistent with the attraction of the greater wealth, which tended to build up among Rome's immediate neighbours and may have played a major role in vectors of migration internal to communities in Europe who lived beyond the Roman frontier 52 . Later, patterns of gene flow seem to have turned northwards, with the spread of Iron Age Central Europe-related ancestry into Scandinavia. Overall, our approach can be used for the reconstruction of new high-resolution genetic histories around the world.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nHunter-gatherers, early European farmers, and Yamnaya Steppe people 46 . We show results for Twigstats-5000. Bias is measured as the difference in admixture proportions obtained from Twigstats-5000 and all SNPs, and we show standard errors of the latter. We plot two standard errors around the mean. The standard error improvement shown is one minus the ratio of standard errors obtained from Twigstats-5000 and using all SNPs. d , Neanderthal admixture proportion inferred using an f 4-ratio of the form f 4(outgroup, Altai, target, Mbuti)/ f 4(outgroup, Altai, Vindija, Mbuti). We compute these on genetic variation data from the Simon's Genome Diversity Project (SGDP) 75 and use the high-coverage Altai and Vindija Neanderthals 78,79 . We also compute equivalent f 4-ratio statistics in a simulation emulating Neanderthal admixture 50,000 years ago and a second simulation involving no Neanderthal admixture but deep structure that leads to a similar inference unless deep coalescences are ignored by Twigstats. We plot two standard errors around the mean.\nExtended Data Fig. 6 | MDS of ancient and modern genomes. a , Same MDS as in Fig. 2 but only showing qpAdm source groups of Fig. 2a and modern groups in the Simons Genome Diversity Project (labelled) computed using genotypes\n(top) or Twigstats (bottom). b , MDS computed using genotypes showing one early medieval or Viking age group per facet. c , MDS computed using Twigstats showing one early medieval or Viking age group per facet.", - "page_start": 16, - "page_end": 17, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "What are the cultures with which the Wielbark culture is associated?", - "target_page": 4, - "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Open Culture\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from Arcadia . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and Open Culture Live: A Webinar Series . We invite you to read ' What did Creative Commons do for Open Culture in 2023? ' to learn more.", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "Expansions of Scandinavian-like ancestry\nshown in black boxes. Sources are highlighted in a and marked as bold in the key, and were used in a rotational qpAdm scheme. For each target group, we remove models with infeasible admixture proportions (falling outside [0, 1]) and use a Twigstats cut-off of 1,000 generations. All models satisfy P > 0.01, unless a -log10[ P value] is shown next to the model. If models satisfy P > 0.05, we show all such models; otherwise, we show only the model with the largest P value. d , The ancestry proportion derived from EIA Scandinavia in groups with a non-zero component of this ancestry. We show groups modelled in c that have a feasible model ( P > 0.01). In c , d , we show one s.e. BA, Bronze Age; CNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking Age; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark archaeological complex has been linked to the later Chernyakhov culture to the southeast and to early Goths, an historical Germanic group that flourished in the second to fifth centuries CE 56 . Our modelling supports the idea that some groups that probably spoke Germanic languages from Scandinavia expanded south across the Baltic into the area between the Oder and Vistula rivers in the early centuries CE, although whether these expansions can be linked specifically with historical Goths is still debatable. Moreover, since a considerable\nproportion of Wielbark burials during this period were cremations, the possible presence of individuals with other ancestries cannot be strictly rejected if they were exclusively cremated (and are therefore invisible in the aDNA record).\nA previous study could not reject continuity in ancestry from the Wielbark-associated individuals to later medieval individuals from a similar region 12 . With the improved power of Twigstats, models of continuity are strongly rejected, with no one-source model of any preceding Iron Age or Bronze Age group providing a reasonable fit for the\nNature | Vol 637 | 2 January 2025 |\n121", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "The \"soft-wired view\"\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to contemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that the psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned. Notable researchers who hold this view include Anna Wierzbicka, [96] Hakwan Lau and Matthias Michel. [97]\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including words like experience and consciousness ) are not universally translatable, and are \"parochially English.\" [96] Weirzbicka calls David Chalmers out by name for using these words, arguing that if\nphilosophers \"were to use panhuman concepts expressed in crosstranslatable words\" (such as know , think , or feel ) then the hard problem would dissolve. [96] David Chalmers has responded to these criticisms by saying that he will not \"apologize for using technical terms in an academic article . . . they play a key role in efficient communication in every discipline, including Wierzbicka's\". [89]", - "page_start": 10, - "page_end": 11, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Expansions of Scandinavian-like ancestry\nWe assembled time transects using available aDNA data across several geographical regions in Europe, and infer their ancestry using a model with the EIA or Roman Iron Age sources previously defined (shown in Fig. 2a). Our modelling provides direct evidence of individuals with ancestry originating in northern Germany or Scandinavia appearing across Europe as early as the first century CE (Figs. 2b,c and 3 and Supplementary Table 3).\nIn the region of present-day Poland, our analysis suggests several clear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 BCE to 1000 BCE), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures 55 (Fig. 3a). Second, in the first to fifth century CE, individuals associated with Wielbark culture 5,12 show an additional strong shift away from the preceding Bronze Age groups, and can only be modelled with a >75% component attributed to the EIA Scandinavian Peninsula. Multiple individuals, especially from earlier Wielbark cemeteries, have approximately 100%\nFig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.\na , Source groups used for qpAdm modelling of early medieval Europe. MDS is computed jointly with individuals from later periods using pairwise outgroup f 3 statistics (outgroup: Han Chinese people). These are calculated using Twigstats on Relate genealogies with a cut-off of 1,000 generations. The geographical map shows sampling locations of these individuals. b , The genetic structure of ancient groups predominantly from early medieval contexts shown on the same MDS as in a . The magnified inset shows an MDS computed without Twigstats on the same samples as the Twigstats MDS and focusing on early medieval or later individuals. c , Ancestry models of early medieval (EM) groups across Europe computed using qpAdm. Sample sizes are", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "CULTURE CHANGE\nThe need to develop a culture that supports the newly designed business processes was another of the major outcomes of the change program. A Santos-wide culture change program led by employees is currently underway.\nThis long-term program is designed to ensure that the way employees work together enhances Santos' ability to be successful.\nOne of the first tasks undertaken was a voluntary employee survey to identify the gaps between the existing culture and the desired culture. The outcomes of the survey will assist in the development of programs and activities that will better align work practices with Santos' strategic goals.", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "WE WILL BE A GREAT PLACE TO WORK.\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active involvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that attracts and retains the most capable people who work safely, are motivated, and are devoted to making our company and our members successful.", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Article\nIn present-day Slovakia, individuals associated with the Iron Age La Tène period appear close to Hungarian Scythians in the two dimensions of our MDS analysis, and are modelled as a mixture of central and eastern European ancestry. However, a first-century CE burial of a 50-60-year-old woman from Zohor is modelled only with Scandinavian-related ancestry, providing evidence of ancestry related to the Scandinavian EIA appearing southwest of the range of the Wielbark archaeological complex 5,57 (Fig. 3b). Later early medieval individuals from Slovakia have partial Scandinavian-related ancestry, providing evidence for the integration between expanding and local groups.\nNearby, in present-day Hungary, we observe Scandinavian-related ancestry components in several burials dating to the sixth century CE associated with Longobards (Longobard_earlyMED(I)) 10 (Fig. 2c). This is consistent with the original study 10 , which reported affinity to present-day groups from northwestern Europe (GBR, CEU and FIN in the 1000 Genomes Project (1000GP)) 10 but which we can resolve with\nhigher resolution using earlier genomes. Several other individuals from these Longobard burials (Longobard_earlyMED(II)) show no detectable ancestry from northern Europe and, instead, are more closely related to Iron Age groups in continental central Europe, putatively representing descendants of local people buried in a Longobard style. Our results are consistent with attestations that the Longobards originated in the areas of present-day northern Germany or Denmark, but that by the sixth century CE they incorporated multiple different cultural identities, and mixed ancestries. Present-day populations of Hungary do not appear to derive detectable ancestry from early medieval individuals from Longobard contexts, and are instead more similar to Scythian-related ancestry sources (Extended Data Fig. 6), consistent with the later impact of Avars, Magyars and other eastern groups 58 .", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nFig. 3 | Time transects across six geographical regions in Europe.\na -f , Ancestry change visualized over a time transect spanning from the Bronze Age to the present day in Poland ( a ), southeastern Europe ( b ), central Europe ( c ), Italy ( d ), Britain and Ireland ( e ) and Scandinavia ( f ). The maps show sample locations of all available ancient genomes with at least 0.5× coverage from\nmedieval individuals ( P ≪ 1 × 10 -32 ). Instead, the majority of individuals from medieval Poland can be modelled only as a mixture of ancestries related to Roman Iron Age Lithuania, which is similar to ancestries of individuals from middle to late Bronze Age Poland (44%, 95% confidence interval 36-51%), an ancestry component related to Hungarian Scythians or Slovakian La Tène individuals (49%, 95% confidence interval 41-57%) and potentially a minority component of ancestry related to Sarmatians from the Caucasus ( P = 0.13) (Fig. 2c). Four out of twelve individuals from medieval Poland, three of whom are from the late Viking Age 6 , carried detectable Scandinavian-related ancestry. Some of the ancestry detected in individuals from later medieval Poland may have persisted during the late first millennium CE in the cremating portion of the population, but regardless, this points to large-scale ancestry transformation in medieval Poland (Fig. 3a). Future data could shed light on the extent to which this reflects the influence of groups speaking Slavic languages in the region.\n122\n| Nature | Vol 637 | 2 January 2025\nthese regions (Supplementary Table 1). Their ancestry is shown on the same MDS model as in Fig. 2a for each time period. For each geographic region, the early medieval period is highlighted in orange and the area in the MDS corresponding to Scandinavian and central European ancestries is highlighted in an orange box.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nIn southern Germany, the genetic ancestry of individuals from early medieval Bavaria probably associated with the historical Germanic-language-speaking Baiuvarii 59 cannot be modelled as deriving ancestry solely from earlier groups in Iron Age central Germany ( P ≪ 1 × 10 -36 ). The Baiuvarii probably appeared in the region in the fifth century CE 59 , but their origins remain unresolved. Our current best model indicates a mixture with ancestry derived from EIA Peninsular Scandinavia and central Europe, suggesting an expansion of Scandinavian-related ancestry producing a regional ancestry shift (Figs. 2c and 3c).\nIn Italy, southward expansions of northern and central European ancestries appear by the Late Antiquity (approximately fourth century CE), where a clear diversification of ancestry can be observed compared with preceding time periods (Fig. 3d). However, no individuals with near 100% Scandinavian ancestry can be observed in the sampling data available so far.\nIn Britain, the ancestries of Iron Age and Roman individuals form a tight cluster in our MDS analysis (Fig. 3e), shifted relative to available preceding Bronze Age individuals from Ireland and Orkney, and adjacent to, but distinct from, available individuals in Iron Age and Roman central Europe. However, two first- to second-century CE burials from a Roman military fortress site in Austria (Klosterneuburg) 5 carry ancestry that is currently indistinguishable from Iron Age or Roman populations of Britain, to the exclusion of other groups (qpWave cladality P = 0.11). One option is that they had ancestry from Britain; alternatively, currently unsampled populations from western continental Europe carried ancestries similar to Iron Age southern Britain.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Article\nTwigstats substantially improves models of admixture between ancestries from Iron Age Britain and northern Europe in early medieval England 9 , halving standard errors from 9% with SNPs to 4% when using time stratification (point estimates 80% and 79% Iron Age Britain-related ancestry, respectively). We used this improved resolution to demonstrate that an earlier Roman individual (6DT3) dating to approximately second to fourth century CE from the purported gladiator or military cemetery at Driffield Terrace in York (Roman Eboracum ), England 60 , who was previously identified as an ancestry outlier 61,62 , specifically carried approximately 25% EIA Scandinavian Peninsula-related ancestry (Fig. 2c). This documents that people with Scandinavian-related ancestry already were in Britain before the fifth century CE, after which there was a substantial influx associated with Anglo-Saxon migrations 9 . Although it is uncertain whether this individual was a gladiator or soldier, individuals and groups from northern Europe are indeed recorded in Roman sources both as soldiers and as enslaved gladiators 63,64 .\nAcross Europe, we see regional differences in the southeastern and southwestern expansions of Scandinavian-related ancestries. Early medieval groups from present-day Poland and Slovakia carry specific ancestry from one of the Scandinavian EIA groups-the one with individuals primarily from the northern parts of Scandinavia in the EIA-with no evidence of ancestry related to the other primary group in more southern Scandinavia (Fig. 2d). By contrast, in southern and western Europe, Scandinavian-related ancestry either derives from\nEIA southern Scandinavia-as in the cases of the probable Baiuvarii in Germany, Longobard-associated burials in Italy and early medieval burials in southern Britain-or cannot be resolved to a specific region in Scandinavia. If these expansions are indeed linked to language, this pattern is remarkably concordant with the main branches of Germanic languages, with the now-extinct eastern Germanic spoken by Goths in Ukraine on the one hand, and western Germanic languages such as Old English and Old High German recorded in the early medieval period on the other hand.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "What do the timescales during which high-amplitude flaring events occur in blazars indicate?", - "target_page": 1, - "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "8. Conclusions\nThe Fermi-LAT is already having a significant impact on the blazar KSP. In future seasons, the VERITAS blazar discovery program will focus its discovery program on hard-spectrum blazars detected by Fermi-LAT, and will likely have a greater focus on high-risk/high-reward objects at larger redshifts (0 . 3 < z < 0 . 7). In addition, the number of VHE blazars studied in pre-planned MWL campaigns will increase as data from the Fermi-LAT will be publicly available. In particular, the extensive pre-planned MWL campaigns will focus on objects that are noteworthy for the impact their data may have on understanding the EBL. The simultaneous observations of blazars by VERITAS and Fermi-LAT will completely resolve the higher-energy SED peak, often for the first time, enabling unprecedented constraints on the underlying blazar phenomena to be derived.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "5. CONCLUSIONS\nThe motivation for observing blazars in the submillimeter is to study behavior close to the central engine, where the jet material is presumably still being accelerated. The separate emission processes that contribute to overall SED may present differently in BL Lacs and FSRQs, allowing us to understand the similarities and differences between blazar types. We have investigated these differences between objects in terms of submillimeter behavior and, in conclusion, find that\n· The SMA blazars exhibit submillimeter energy spectral indexes that follow the spectral sequence interpretation of blazars.\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\nFigure 5: Ratio of γ -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this plot should be directly correlated with its blazar 'state', with FSRQs occupying the upper right and BL Lacs the lower left. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n· BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter variability or characteristic timescale, but our sample of BL Lacs may be dominated by highpeaked BL Lacs (HBLs), which exhibit observational similarities with FSRQs.\n· Blazar submillimeter light curves are consistent with being produced by a single process that accounts for both high and low states, with characteristic timescales 10 < τ rest < 500 days.\n· The blazars detected by Fermi have synchrotron peaks at higher frequencies, regardless of submillimeter luminosity.\n· FSRQs exhibit higher ratios of γ -ray to submillimeter luminosity than BL Lacs (Figure 5), but all objects inhabit a region of parameter space suggesting transitions between states during flaring epochs.\nAs Fermi continues to observe fainter sources, the sample of objects for which we can perform this type of analysis will increase and provide better limits on our results. To understand the physical relevance of these results, however, it is important to be able to distinguish between the difference in variability between BL\neConf C091122", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "5. CONCLUSIONS\nLacs and FSRQs. One avenue for exploring this difference is to monitor changing submillimeter energy spectral index and the ratio of γ -ray to submillimeter luminosity as functions of time. The full meaning of the results of our autoregressive method is not yet clear, and will require better-sampled blazar light curves and the comparison between τ rest with physical timescales such as the synchrotron cooling timescale. These analyses would allow us to place constraints on the processes occurring near the base of the jet in blazars and further understand the intimate connection between them.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "Where is the Submillimeter Array?", - "target_page": 1, - "target_passage": "near the summit of Mauna Ke", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "5. CONCLUSIONS\nThe motivation for observing blazars in the submillimeter is to study behavior close to the central engine, where the jet material is presumably still being accelerated. The separate emission processes that contribute to overall SED may present differently in BL Lacs and FSRQs, allowing us to understand the similarities and differences between blazar types. We have investigated these differences between objects in terms of submillimeter behavior and, in conclusion, find that\n· The SMA blazars exhibit submillimeter energy spectral indexes that follow the spectral sequence interpretation of blazars.\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\nFigure 5: Ratio of γ -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this plot should be directly correlated with its blazar 'state', with FSRQs occupying the upper right and BL Lacs the lower left. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n· BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter variability or characteristic timescale, but our sample of BL Lacs may be dominated by highpeaked BL Lacs (HBLs), which exhibit observational similarities with FSRQs.\n· Blazar submillimeter light curves are consistent with being produced by a single process that accounts for both high and low states, with characteristic timescales 10 < τ rest < 500 days.\n· The blazars detected by Fermi have synchrotron peaks at higher frequencies, regardless of submillimeter luminosity.\n· FSRQs exhibit higher ratios of γ -ray to submillimeter luminosity than BL Lacs (Figure 5), but all objects inhabit a region of parameter space suggesting transitions between states during flaring epochs.\nAs Fermi continues to observe fainter sources, the sample of objects for which we can perform this type of analysis will increase and provide better limits on our results. To understand the physical relevance of these results, however, it is important to be able to distinguish between the difference in variability between BL\neConf C091122", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "5. CONCLUSIONS\nLacs and FSRQs. One avenue for exploring this difference is to monitor changing submillimeter energy spectral index and the ratio of γ -ray to submillimeter luminosity as functions of time. The full meaning of the results of our autoregressive method is not yet clear, and will require better-sampled blazar light curves and the comparison between τ rest with physical timescales such as the synchrotron cooling timescale. These analyses would allow us to place constraints on the processes occurring near the base of the jet in blazars and further understand the intimate connection between them.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "2.1. Submillimeter Properties\nSubmillimeter Luminosities. Since we are primarily concerned with comparisons to Fermi observations, we note that only 129 of the SMA blazars (23 BL Lacs and 106 FSRQs) were observed by the SMA in either band during the three months August-October 2008. For these objects, submillimeter luminosities are calculated in the standard way:\nν e L ν e = 4 πD 2 L ν obs F obs 1 + z , (1)\nwhere D L is the luminosity distance, ν obs is the frequency of the observed band, and F obs is the average\neConf C091122\nFigure 2: Variability index for our sample (top: 1mm, bottom: 850 µ m), with FSRQs as the hatched distribution and BL Lacs as the solid distribution. There is no signicant difference in the class distributions in either band; the 'tail' to the left is populated by objects with errors larger than the intrinsic variability.\nflux (in erg cm -2 s -1 Hz -1 ) over the three month period. We adopt a lambda cold dark matter cosmology with values of H 0 = 71 km s -1 Mpc -1 , Ω M = 0 . 27, and Λ = 0 . 73.\nEnergy Spectral Indices. We derive submillimeter spectral energy indices from observations quasisimultaneous with the Fermi observations. To be consistent with the use of α γ , we define spectral energy index as νF ν = ν -α S and calculate α S from the average of the energy spectral indices over the corresponding three months. We only calculate α S for the 16 objects (8 BL Lacs and 35 FSRQs) with observations at both 1mm and 850 µ m during this time frame.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "2. SMA BLAZARS\nThe Submillimeter Array [4] consists of eight 6 m antennas located near the summit of Mauna Kea. The SMA is used in a variety of baseline configurations and typically operates in the 1mm and 850 µ m windows, achieving spatial resolution as fine as 0.25' at 850 µ m. The sources used as phase calibrators for the array are compiled in a database known as the SMA Calibrator List 2 [5]. Essentially a collection of bright objects (stronger than 750 mJy at 230 GHz and 1 Jy at 345 GHz), these sources are monitored regularly, both during science observations and dedicated observing tracks.\nTo select our sample, we identified objects in the calibrator list that were also classified as BL Lacs or FSRQs by the Candidate Gamma-Ray Blazar Survey [6, CGRaBS]. Of the 243 total objects in the calibrator list, 171 (35 BL Lacs and 136 FSRQs) have positive blazar class identifications, although there are three sources (J0238+166, J0428-379, and\n1 The Submillimeter Array is a joint project between the Smithsonian Astrophysical Observatory and the Academia Sinica Institute of Astronomy and Astrophysics and is funded by the Smithsonian Institution and the Academia Sinica.\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: The SMA light curves for 3C 454.3. The open circles represent the 850 µ m observations, and the open triangles represent the 1mm observations.\nJ1751+096) which have conflicting classifications between Fermi and CGRaBS. Some blazars found in the calibrator list have been studied extensively (e.g., 3C 279 and 3C 454.3) but the SMA blazars have not been studied collectively.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "4. CONNECTION WITH GAMMA-RAYS\nIn general, we find that in the submillimeter, we are observing these blazars at or near the peak of the synchrotron component ( α S ∼ 0), but that Fermi -detected sources have more negative energy spectral indices overall than Fermi -nondetected sources. In Figure 4, we see that while the majority of Fermi blazars are observed on the rising part of the synchrotron component (at lower energies than the peak), all of the objects have very steeply falling γ -ray energy spectral indexes, putting the γ -ray peak at lower energies than the observed Fermi band. Knowing that we are not observing the synchrotron and γ -ray components at analagous points in the spectrum may allow us to better understand the magnetic field in the parsec-scale jet region and the population of external photons that is being upscattered to γ -rays.\nIn Figure 5, the ratio between L γ and νL ν, 1mm reflects the division between BL Lacs and FSRQs as well\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 4: The γ -ray index versus submillimeter index plane. The blazars fall more steeply in the γ -rays than in the submillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, where the blazars are more distributed around α S ∼ 0.\nas the presence of SSC versus ERC. Here, we use submillimeter luminosity as a proxy for jet power, which is correlated with the integrated luminosity of the synchrotron component. Elevated γ -ray luminosity with respect to the synchrotron component (which is often seen in FSRQs) suggests the upscattering of external photons off the synchrotron-emitting electrons. These objects should occupy the upper right of the ratio/jet power plot, and BL Lacs, which generally exhibit components with roughly comparable luminosities, should occupy the lower left. It is clear from the figure, however, that many FSRQs exhibit ratios similar to those of the BL Lacs and vis versa.", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "Drives\nSelect Drives to see information about the drives that are included in the array as shown in Figure 6-47 on page 227.\nFigure 6-47 List of drives in an array\nYou can use the CLI command lsarraymember to get the same information with the CLI. Provide an array name or ID as the parameter to filter output by the array. If run without arguments, the command lists all members of all configured arrays.", - "page_start": 247, - "page_end": 248, - "source_file": "sg247938.pdf" - }, - { - "text": "6.2 Working with internal drives and arrays\nAn array is a type of MDisk that is made up of disk drives (or flash drive modules); these drives are members of the array. A Redundant Array of Independent Disks (RAID) is a method of configuring member drives to create high availability and high-performance groups. The system supports nondistributed (traditional) and distributed array configurations.", - "page_start": 228, - "page_end": 228, - "source_file": "sg247938.pdf" - }, - { - "text": "Automatic internal configuration\nYou can still add any array of any configuration to an existing pool by using the CLI.\nWhen you are satisfied with the configuration presented, click Assign . The RAID arrays, or MDisks, are then created and initialized in the background. You can monitor the progress of the initialization process by selecting the corresponding task under Running Tasks in the upper-right corner of GUI screen, as shown in Figure 6-39. The array is available for I/O during this process.\nFigure 6-39 Array Initialization task\nClick View in the Running tasks list to see the initialization progress and the time that remains, as shown in Figure 6-40. Notice that array creation depends on the type of drives it consists of. For example, an array of Flash drives is much quicker to initialize than NL-SAS drives.\nFigure 6-40 Array initialization task progress information", - "page_start": 241, - "page_end": 241, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "How many blazars were observed by the SMA in either band during the three months August-October 2008?", - "target_page": 2, - "target_passage": "only 129 of the SMA blazars", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "2. SMA BLAZARS\nThe Submillimeter Array [4] consists of eight 6 m antennas located near the summit of Mauna Kea. The SMA is used in a variety of baseline configurations and typically operates in the 1mm and 850 µ m windows, achieving spatial resolution as fine as 0.25' at 850 µ m. The sources used as phase calibrators for the array are compiled in a database known as the SMA Calibrator List 2 [5]. Essentially a collection of bright objects (stronger than 750 mJy at 230 GHz and 1 Jy at 345 GHz), these sources are monitored regularly, both during science observations and dedicated observing tracks.\nTo select our sample, we identified objects in the calibrator list that were also classified as BL Lacs or FSRQs by the Candidate Gamma-Ray Blazar Survey [6, CGRaBS]. Of the 243 total objects in the calibrator list, 171 (35 BL Lacs and 136 FSRQs) have positive blazar class identifications, although there are three sources (J0238+166, J0428-379, and\n1 The Submillimeter Array is a joint project between the Smithsonian Astrophysical Observatory and the Academia Sinica Institute of Astronomy and Astrophysics and is funded by the Smithsonian Institution and the Academia Sinica.\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: The SMA light curves for 3C 454.3. The open circles represent the 850 µ m observations, and the open triangles represent the 1mm observations.\nJ1751+096) which have conflicting classifications between Fermi and CGRaBS. Some blazars found in the calibrator list have been studied extensively (e.g., 3C 279 and 3C 454.3) but the SMA blazars have not been studied collectively.", - "page_start": 0, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", - "page_start": 2, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", - "page_start": 3, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "8. Conclusions\nThe Fermi-LAT is already having a significant impact on the blazar KSP. In future seasons, the VERITAS blazar discovery program will focus its discovery program on hard-spectrum blazars detected by Fermi-LAT, and will likely have a greater focus on high-risk/high-reward objects at larger redshifts (0 . 3 < z < 0 . 7). In addition, the number of VHE blazars studied in pre-planned MWL campaigns will increase as data from the Fermi-LAT will be publicly available. In particular, the extensive pre-planned MWL campaigns will focus on objects that are noteworthy for the impact their data may have on understanding the EBL. The simultaneous observations of blazars by VERITAS and Fermi-LAT will completely resolve the higher-energy SED peak, often for the first time, enabling unprecedented constraints on the underlying blazar phenomena to be derived.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "4. Blazar Discovery Program\nThe blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. However, the program also includes IBLs (intermediatepeaked) and LBLs (low-peaked), as well as flat spectrum radio quasars (FSRQs), in an attempt to increase the types of blazars known to emit VHE γ -rays. The observed targets are drawn from a target list containing objects visible to the telescopes at reasonable zenith angles ( -8 · < δ < 72 · ), without a previously published VHE limit below 1.5% Crab, and with a measured redshift z < 0 . 3. To further the study of the\neConf C091122\nEBL a few objects having a large ( z > 0 . 3) are also included in the target list. The target list includes:\n· All nearby ( z < 0 . 3) HBL and IBL recommended as potential VHE emitters in [5, 6, 7].\n· The X-ray brightest HBL ( z < 0 . 3) in the recent Sedentary [8] and ROXA [9] surveys.\n· Four distant ( z > 0 . 3) BL Lac objects recommended by [5, 10].\n· Several FSRQ recommended as potential VHE emitters in [6, 11].\n· All nearby ( z < 0 . 3) blazars detected by EGRET [12].\n· All nearby ( z < 0 . 3) blazars contained in the Fermi-LAT Bright AGN Sample [13].\n· All sources ( | b | > 10 · ) detected by Fermi-LAT where extrapolations of their MeV-GeV γ -ray spectrum (including EBL absorption; assuming z = 0.3 if the redshift is unknown) indicates a possible VERITAS detection in less than 20 h. This criteria is the focus of the 2009-10 VERITAS blazar discovery program.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "5.1. Recent VERITAS Blazar Discoveries\nPrior to the launch of Fermi VERITAS had discovered VHE emission from 2 blazars. These included the first VHE-detected IBL, W Comae [14, 15], and the HBL 1ES0806+524 [16]. VERITAS has discovered 6 VHE blazars since the launch of Fermi. Three of these were initially observed by VERITAS prior to the release of Fermi-LAT results, due to the X-ray brightness of the synchrotron peaks of their SEDs.\nVHEemission from 3C66A was discovered by VERITAS in September 2008 [17] during a flaring episode that was also observed by the Fermi-LAT [18]. The observed flux above 200 GeV was 6% of the Crab Nebula flux and the measured VHE spectrum was very soft (Γ VHE ∼ 4 . 1). RGBJ0710+591 was detected\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.", - "page_start": 1, - "page_end": 2, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "How big is the Mermaid fleet?", - "target_page": 12, - "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "MERMAID FLEET\n23", - "page_start": 26, - "page_end": 26, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "7. RELATED PARTY TRANSACTIONS\nThe directors of Mermaid Marine Australia Limited during the Financial Year were:\nA G Birchmore\n(appointed 12 August 1998)\nJ H Carver\n(appointed 29 June 1998)\nD A Dillon\n(appointed 12 August 1998)\nJ A S Mews\n(appointed 12 August 1998)\nInterest in the shares of the Company held by directors and their director related entities as at 30 June 2000.\nA G Birchmore, Mermaid Marine Australia Limited.Ordinary Shares = 13,695,300. A G Birchmore, Mermaid Marine Australia Limited.Options over Ordinary Shares = 382,000. J H Carver, Mermaid Marine Australia Limited.Ordinary Shares = 13,631,300. J H Carver, Mermaid Marine Australia Limited.Options over Ordinary Shares = 20,000. D A Dillon, Mermaid Marine Australia Limited.Ordinary Shares = 1,520,000. D A Dillon, Mermaid Marine Australia Limited.Options over Ordinary Shares = 10,000. J A S Mews, Mermaid Marine Australia Limited.Ordinary Shares = 1,500,000. J A S Mews, Mermaid Marine Australia Limited.Options over Ordinary Shares = -\nThe following related party transactions occurred during the Financial Year:", - "page_start": 59, - "page_end": 59, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n= . Mermaid Marine Offshore Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Offshore Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Offshore Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Offshore Pty Ltd*, = . Mermaid Marine Charters Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Charters Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Charters Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Charters Pty Ltd*, = . Mermaid Supply Base Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Supply Base Pty Ltd*, Company.2000 $ = 100. Mermaid Supply Base Pty Ltd*, Company.1999 $ = 100. Mermaid Supply Base Pty Ltd*, = . Dampier Stevedoring Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Dampier Stevedoring Pty Ltd*, Company.2000 $ = 100. Dampier Stevedoring Pty Ltd*, Company.1999 $ = 100. Dampier Stevedoring Pty Ltd*, = . Mermaid Manning and Management Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Manning and Management Pty Ltd*, Company.2000 $ = 100. Mermaid Manning and Management Pty Ltd*, Company.1999 $ = 100. Mermaid Manning and Management Pty Ltd*, = \n* Pursuant to ASIC Class Order 98/1418, relief has been granted to these wholly owned controlled entities from the Corporations Law requirements for preparation, audit and lodgement of the financial report. As a condition of the Class Order, Mermaid Marine Australia Limited and the controlled entities entered into a Deed of Cross Guarantee on 24 June 1999.", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "MERMAID LABOUR AND MANAGEMENT LIMITED\nSAFETY\n20\nDuring 2000 Mermaid Marine formed a new business unit Mermaid Labour and Management Limited. The focus of this unit will be labour supply and industrial relations management to the marine, offshore construction industry and onshore resources projects in the NW of Australia. The Directors and Management of the new entity are very experienced, well known and regarded by the industry in general. The company has high expectations for Mermaid Labour and Management Limited.\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have responsibility.\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company's accreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid's quality assurance and compliance team continues with a continuous day to day effort to improve our health, safety and environmental performance. Stringent charterer requirements, which are a pre requisite of increased vessel usage, must be met to the letter and are the subject of regular and demanding audits. Although time consuming and expensive, we are grateful to certain of the large producers, who while demanding the highest levels of compliance, have also been prepared to give their time, sharing their safety expertise with us and in that way assisting in the very major advances our company has made in this all important area.\nAt the time of writing this report, Mermaid had accumulated 348 days without a Lost Time Injury. A fine achievement and a continuing record.", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "B. QUAY WALL ( BERTH 1)\nMarket research and customer needs have caused Mermaid to relocate and redesign the main berth to accommodate a wider range of vessels than originally contemplated. The berth is now located in deeper water with better vessel access.\nThe regional offshore fleet characteristics have been changing in terms of vessel size. There are now four vessels operating in the region with 12,000 to 18,000 hp. When design commenced there were none of this size.\nThe depth alongside Berth 1 will be 7.5m. King Bay has a statistical average extreme low tide (MLWS) of 0.9 m, the occurrence of which can be expressed in hours per month. The largest", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "SIGNIFICANT CHANGES IN THE STATE OF AFFAIRS\nReviews set out the matters which have had a significant effect on the state of affairs of Mermaid. Other than those matters there were no significant changes in the state of affairs of Mermaid during the Financial Year.", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "OPERATIONS REVIEW\nBare boat charters, although useful for the busy times encountered in 1998 exposed the Company to a high level of fixed costs. The vessels were valuable earners and the transfer of the Mermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved to be the right decision for all market conditions. Although there have been no contracts yet let for work of any significance by producers on the North West Shelf, underlying day to day activity has returned. Expressions of interest for major project work have been issued and as an indication of better trading conditions, an unaudited profit of $496,721 has been recorded for the two months to 31st August 2000. The trend has continued in September.\n7", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\nINVESTMENTS, Consolidated 1999.2000 $ $ = . INVESTMENTS, Company.2000 $ = . INVESTMENTS, Company.1999 $ = . INVESTMENTS, = . At cost:, Consolidated 1999.2000 $ $ = . At cost:, Company.2000 $ = . At cost:, Company.1999 $ = . At cost:, = . Unlisted investment - shares controlled in entities, Consolidated 1999.2000 $ $ = -. Unlisted investment - shares controlled in entities, Company.2000 $ = - 2,444,611. Unlisted investment - shares controlled in entities, Company.1999 $ = 2,444,611. Unlisted investment - shares controlled in entities, = . , Consolidated 1999.2000 $ $ = Country of. , Company.2000 $ = Ownership Interest 2000. , Company.1999 $ = Ownership. , = . , Consolidated 1999.2000 $ $ = Incorporation. , Company.2000 $ = . , Company.1999 $ = Interest 1999. , = . Parent Entity, Consolidated 1999.2000 $ $ = . Parent Entity, Company.2000 $ = . Parent Entity, Company.1999 $ = . Parent Entity, = . Mermaid Marine Australia Limited, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Australia Limited, Company.2000 $ = . Mermaid Marine Australia Limited, Company.1999 $ = . Mermaid Marine Australia Limited, = . Controlled Entities, Consolidated 1999.2000 $ $ = . Controlled Entities, Company.2000 $ = . Controlled Entities, Company.1999 $ = . Controlled Entities, = . Mermaid Marine Group Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Group Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Group Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Group Pty Ltd*, = . Mermaid Marine Vessel Operations Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Vessel Operations Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Vessel Operations Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Vessel Operations Pty Ltd*, = . Mermaid Marine Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Pty Ltd*,", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "OPERATIONS REVIEW\nThe foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.\nleased facilities to seven third party vessels and protection for three of our own vessels using this technique by the cyclone season in 2001.\nAs more vessels seek protection, additional breakwaters can be constructed and sea room dredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four vessel specific mooring lines secured to special attachment points on the vessel.\nMany smaller vessels including Mermaid's will be lifted from the water and tied down on purpose built cradles for cyclones.", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "F. ONSHORE LAND RECLAMATION.\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or needs some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is suitable for development in its present state.\nThe spoil produced from dredging will allow Mermaid to achieve full utilization of the site at a fraction of the cost of importing fill from elsewhere.\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services such as traffic flows, land allocation and security, as well as fulfilling the many and complex regulatory requirements related to health, safety, quarantine, environmental management, dust, dangerous goods and hazchem materials have been the subject of considerable study prior to this implementation stage.\nMERMAID MARINE AUSTRALIA LIMITED\n13\nOPERATIONS REVIEW", - "page_start": 16, - "page_end": 20, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "What was the budget for the expansion of Dampier Base?", - "target_page": 14, - "target_passage": "a capital budget of $13m", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "BASE EXPANSION WORKS AND ENVIRONMENTAL MANAGEMENT\nWork on Dampier\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving a capital budget of $13m.\nThe principle activities and facility developments involved in the expansion are:", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "SEAGOING OPERATIONS\nMermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity including exploration support, supply, survey and berthing assist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. Two tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the work increased productivity through enhanced bollard pull and consequent earnings.\nSafety was given the highest priority through new monitoring systems and awareness programs. Formalised on the job instruction and training courses have also lifted levels of experience and proficiency across the workforce.\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all exploration and development budgets of Australia's offshore oil and gas industry. The Burrup Peninsular where the Base is located is the intended site of major new oil, gas, petrochemical and industrial mineral processing plants. The Port of Dampier is Australia's largest Port as measured by tonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there remains an urgent need for additional marine support infrastructure. Mermaid is now well advanced in our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. DAMPIER BASE\nSince receiving approval in principle for development of the Dampier Base from the Western Australian Minister for the Environment in February 2000, engineering and general design work in connection with the base proceeded at an accelerated pace.\nThis work, assisted by technical studies and a re-assessment of an increased demand for services arising out of greater expectations for growth in the sector, has led to improvements and expansion of capacity over earlier plans.\nThe Dampier Base will now comprise:-\n·\n·\nAn 'all tides' approach channel to a minimum depth of 6 metres", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Base Salary\n- 33 -", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "OPERATIONS REVIEW\nTrading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine Australia Ltd ('Company') and its controlled entities, experienced a 43% turnover reduction from last year. The result was almost entirely due to a heavy fall in oil prices, which reached their low of US$10 in February 1999, leading to the lowest level of offshore activity for many years. In September 1999 Mermaid exercised its option to acquire the utility vessel 'Mermaid Achiever' for $3,250,000. Previously the Achiever operated under a bare boat charter.\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister for the Environment for the development of a supply and engineering base at Dampier (Dampier Base). Since that time a detailed environmental management system has been produced for final approval and as a guide to daily environmental management and compliance. Refinements to the design have proceeded, together with the preparation of bid packages and negotiations with Banks for project finance.\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough Engineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. As construction commences at Dampier, a level of project finance will be arranged providing a comfortable mix of debt and equity and allowing the retention of a significant cash balance.\nThe year saw considerable progress with Base activities at Dampier, Broome and Darwin. They are dealt with in detail under following headings.\nFINANCIAL\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax profit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease of 43% over the previous period. Fixed cost reductions enabled the Company to ride out the market reversal with a minimal loss and positive operating cash before capex of $1.6m. This result, achieved against a major drop in turnover, was possible through a vigorous attack on overheads, which included more beneficial ownership costs, insurance savings, management salary savings, including voluntary sacrifice from certain senior executives in recognition of the tighter conditions. In all the changes contributed approximately $1.5million to the bottom line.", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Growing in Areas of Expansion\n64", - "page_start": 65, - "page_end": 65, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "OPERATIONS REVIEW\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle most of the 60 vessels currently working in the region, a considerable number, but one which will rise over coming years. First class engineering facilities have been planned and highly experienced management recruited. Alternative slipways offering comparable capacity are only to be found in Darwin or Fremantle, a sea journey of approximately 1000 miles from this operational region. Australia has emerged as a centre of excellence with respect to vessel repair work, the Dampier facility will both benefit from and protect that valuable reputation.\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The major oilfield services company Halliburton, have been attracted to the base as a tenant and a $1.1m purpose built building is being constructed for their use. Negotiations are also proceeding with other groups who recognise the unique advantages of operating from this strategically positioned Base. Rental income and associated revenues such as plant and labour hire will contribute significantly to the overall economics of the facility.\nProtected moorings for cyclone shelter will be established inside the breakwater for long term lease to local tug operators. The demand arises from serious vessel and crew safety considerations. The Dampier Port Authority are reluctant to see the continued use of cyclone moorings in the Harbour, not only for safety reasons, but for environmental concerns as well. Oil spills are not acceptable under any circumstances and will be avoided whatever the cost. Tug owners share similar concerns, but in addition they need to remain in a position of readiness for crews and equipment to resume their important functions immediately following a cyclonic event. The number of specific purpose spread moorings, detailed on the adjacent plan will total 10 in the first phase of construction, a limit which will be assisted by an ability to remove vessels up to 100 tonnes from the water by wharf crane for tie down on cradles.\nConstruction of the Dampier Base commenced on the 9th October this year, with an expectation that all major elements of the project will be largely completed within 12 months.\nThe 'Clough Challenge' Barge Shallow Water Construction Support Barge in the East Spar Field\n9", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Base Salary\nBase salaries for executives recognize their qualifications, experience and responsibilities as well as their unique value and historical contributions to Sundance. In addition to being important to attracting and retaining executives, setting base salaries at appropriate levels motivates employees to aspire to and accept enlarged opportunities. We do not consider base salaries to be part of performance-based remuneration. In setting the amount, the individuals' performance is considered as well as the length of time in their current position without a salary increase.\n2013 Base Salaries and 2014 Salary Adjustments", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Capital Expenditures\nWe expect capital expenditures for fiscal 2013 to be in the $13.0 million to $14.0 million range, consisting of capital associated with additional information technology equipment and infrastructure investments. Depreciation for fiscal 2013 is expected to be in the range of $12.5 million to $13.5 million.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Example\nTable 2-2 Overage calculation\n25, Base = 16.8. 25, Overage = 8.2. 25, To be billed = 8. 42.6, Base = 16.8. 42.6, Overage = 25.8. 42.6, To be billed = 26. 22.2, Base = 16.8. 22.2, Overage = 5.4. 22.2, To be billed = 5", - "page_start": 36, - "page_end": 36, - "source_file": "sg247938.pdf" - }, - { - "text": "Capital Expenditures\nOur capital expenditures over the last three years totaled $2,177, with $861 in 2014, $803 in 2013 and $513 in 2012. Capital expenditures increased in 2014 compared with 2013 primarily due to ongoing store expansion and increased technology investments.\nCapital expenditures increased in 2013 compared with 2012 as we continued to make progress executing our customer strategy through increased investments in technology, ecommerce, remodels and new stores, including Nordstrom Rack and our Manhattan full-line store.\nThe following table summarizes our store count and square footage activity:", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "When did Mermaid Marine Service Base in the Port of Broome start?", - "target_page": 22, - "target_passage": "1 February 2000", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "BROOME SUPPLY BASE\nMermaid Marine services base at the Port of Broome (Broome Base) commenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex Browse Ltd arrived from Japan.\nAs a result of Mermaid's efforts in establishing the Broome Base, Inpex Browse Ltd., BHP Petroleum and Woodside have used Broome as their base for drilling a total of four (4) offshore wells.\nIt is presently expected that at least six (6) exploration wells will be drilled in the area during 2001. The Base now employs as many as ten (10) staff up from the three (3) who commenced in February 2000. Excellent management and staff competence are the prime factors, which have delivered the smooth start up and continued success at Broome.\nThe Mermaid Broome Supply Base certified Impex, Woodside and BHP Petroleum exploration program during 2000.\nThe base is currently secured on a come and go lease arrangement, located on Port premises adjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the site has limitations in terms of size and slope. An area more suitable for our long term needs has been optioned from Port authorities and discussions will proceed with our clients this year to determine their precise needs.\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and the intention of operators to base their 2001 operations in Broome, have encouraged the Board to consider further investment to ensure that capability keeps pace with demand and that we leave no reason for competitors to offer more or better.", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "OPERATIONS REVIEW\nDarwin is serviced by three marine infrastructure elements.\na. A public port adjacent to the main business centre, which is destined to be redeveloped as a cruise ship and tourism precinct .\nb. A group of freehold water front properties on Frances Bay near to the main business center.\nc. A recently commissioned public port and industrial estate at East Arm some 25 km from the main business district.\nDarwin already has an abundance of shore based logistics service providers who operate from onshore industrial estates through publicly owned facilities.\nThe Northern Territory Government has sponsored a study to determine the marine infrastructure deficits of the Darwin area. Mermaid has contributed to the study and is monitoring the subsequent planning processes.\nRegardless of industry trends, Mermaid has a need for a Darwin Base to service and care for Mermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the conclusion of a contract then being required to return to Darwin within days or weeks for another assignment.\nMermaid has decided that needs and opportunities in the north of Australia can be best served by entering a co-operative arrangement with an established Darwin Company. Agreement has therefore been reached with Perkins Shipping Group, who are one of the freehold land owners on Frances Bay.\nPerkins Shipping, established in the 1950s is the major coastal shipping service provider in Australia's north, linking Darwin to mining and aboriginal committees from the Kimberly to Gulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in Indonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are different, but complementary, offering benefits to both. The arrangement with Perkins will give Mermaid well placed office facilities, open storage and waterfront access.\nOur intention is that Darwin become the third and final mainland entreport to service the Northwestern offshore oil and gas industry together with our other strategically placed facilities at Dampier and Broome.\n19", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "MERMAID FLEET\n23", - "page_start": 26, - "page_end": 26, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n= . Mermaid Marine Offshore Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Offshore Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Offshore Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Offshore Pty Ltd*, = . Mermaid Marine Charters Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Marine Charters Pty Ltd*, Company.2000 $ = 100. Mermaid Marine Charters Pty Ltd*, Company.1999 $ = 100. Mermaid Marine Charters Pty Ltd*, = . Mermaid Supply Base Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Supply Base Pty Ltd*, Company.2000 $ = 100. Mermaid Supply Base Pty Ltd*, Company.1999 $ = 100. Mermaid Supply Base Pty Ltd*, = . Dampier Stevedoring Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Dampier Stevedoring Pty Ltd*, Company.2000 $ = 100. Dampier Stevedoring Pty Ltd*, Company.1999 $ = 100. Dampier Stevedoring Pty Ltd*, = . Mermaid Manning and Management Pty Ltd*, Consolidated 1999.2000 $ $ = Australia. Mermaid Manning and Management Pty Ltd*, Company.2000 $ = 100. Mermaid Manning and Management Pty Ltd*, Company.1999 $ = 100. Mermaid Manning and Management Pty Ltd*, = \n* Pursuant to ASIC Class Order 98/1418, relief has been granted to these wholly owned controlled entities from the Corporations Law requirements for preparation, audit and lodgement of the financial report. As a condition of the Class Order, Mermaid Marine Australia Limited and the controlled entities entered into a Deed of Cross Guarantee on 24 June 1999.", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "SEAGOING OPERATIONS\nMermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity including exploration support, supply, survey and berthing assist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. Two tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the work increased productivity through enhanced bollard pull and consequent earnings.\nSafety was given the highest priority through new monitoring systems and awareness programs. Formalised on the job instruction and training courses have also lifted levels of experience and proficiency across the workforce.\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all exploration and development budgets of Australia's offshore oil and gas industry. The Burrup Peninsular where the Base is located is the intended site of major new oil, gas, petrochemical and industrial mineral processing plants. The Port of Dampier is Australia's largest Port as measured by tonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there remains an urgent need for additional marine support infrastructure. Mermaid is now well advanced in our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. DAMPIER BASE\nSince receiving approval in principle for development of the Dampier Base from the Western Australian Minister for the Environment in February 2000, engineering and general design work in connection with the base proceeded at an accelerated pace.\nThis work, assisted by technical studies and a re-assessment of an increased demand for services arising out of greater expectations for growth in the sector, has led to improvements and expansion of capacity over earlier plans.\nThe Dampier Base will now comprise:-\n·\n·\nAn 'all tides' approach channel to a minimum depth of 6 metres", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "7. RELATED PARTY TRANSACTIONS\nThe directors of Mermaid Marine Australia Limited during the Financial Year were:\nA G Birchmore\n(appointed 12 August 1998)\nJ H Carver\n(appointed 29 June 1998)\nD A Dillon\n(appointed 12 August 1998)\nJ A S Mews\n(appointed 12 August 1998)\nInterest in the shares of the Company held by directors and their director related entities as at 30 June 2000.\nA G Birchmore, Mermaid Marine Australia Limited.Ordinary Shares = 13,695,300. A G Birchmore, Mermaid Marine Australia Limited.Options over Ordinary Shares = 382,000. J H Carver, Mermaid Marine Australia Limited.Ordinary Shares = 13,631,300. J H Carver, Mermaid Marine Australia Limited.Options over Ordinary Shares = 20,000. D A Dillon, Mermaid Marine Australia Limited.Ordinary Shares = 1,520,000. D A Dillon, Mermaid Marine Australia Limited.Options over Ordinary Shares = 10,000. J A S Mews, Mermaid Marine Australia Limited.Ordinary Shares = 1,500,000. J A S Mews, Mermaid Marine Australia Limited.Options over Ordinary Shares = -\nThe following related party transactions occurred during the Financial Year:", - "page_start": 59, - "page_end": 59, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "OPERATIONS REVIEW\nThe foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.\nleased facilities to seven third party vessels and protection for three of our own vessels using this technique by the cyclone season in 2001.\nAs more vessels seek protection, additional breakwaters can be constructed and sea room dredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four vessel specific mooring lines secured to special attachment points on the vessel.\nMany smaller vessels including Mermaid's will be lifted from the water and tied down on purpose built cradles for cyclones.", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "CHAIRMAN'S REPORT\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu Undan project operated by Phillips, is well advanced and will impact Darwin's offshore activity quite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with Perkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping is synonymous with Darwin's history. Set up by V.B. Perkins in the late 40's, it has grown to significant size, operating its ships across the top of Australia and into South East Asia. There are many synergies which Mermaid shares with Perkins and we look forward to developing our Darwin business in close association with that fine old Company.\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early in the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to be paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour hire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General Manager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director. With their reputation and talent added to Mermaid's experienced team, this labour hire company has become a significant force and can be expected to be in the final when major labour hire contracts are let.\n5\n6\nLabour hire is heavily dependent upon the quality of the personnel database and our intention has been announced to offer training at Dampier, Broome and Darwin for those who live in the North West and wish to work in the offshore industry there. Planning for this new initiative is well advanced and we expect to be running courses for prospective offshore employees in coming months. Although the training program is not directed to any particular community group, it has been encouraging to have active support from Aboriginal leaders in the Kimberley region.\nWorld prospects for energy, the need for Australia to add value to its resources, Government initiatives for the support of these activities and environmental imperatives, heavily favour gas, giving every indication that Mermaid Marine's development push has been extremely timely.\nIt is also important to draw attention to increased efforts in terms of health, safety and environmental protection. Our workplace is largely at sea, where operations involve natural dangers and the safety of our people is paramount. We also work in a setting where the tasks in which we are involved cast us in the role of environmental caretakers of the sea and coastline.", - "page_start": 8, - "page_end": 9, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "MERMAID LABOUR AND MANAGEMENT LIMITED\nSAFETY\n20\nDuring 2000 Mermaid Marine formed a new business unit Mermaid Labour and Management Limited. The focus of this unit will be labour supply and industrial relations management to the marine, offshore construction industry and onshore resources projects in the NW of Australia. The Directors and Management of the new entity are very experienced, well known and regarded by the industry in general. The company has high expectations for Mermaid Labour and Management Limited.\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have responsibility.\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company's accreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid's quality assurance and compliance team continues with a continuous day to day effort to improve our health, safety and environmental performance. Stringent charterer requirements, which are a pre requisite of increased vessel usage, must be met to the letter and are the subject of regular and demanding audits. Although time consuming and expensive, we are grateful to certain of the large producers, who while demanding the highest levels of compliance, have also been prepared to give their time, sharing their safety expertise with us and in that way assisting in the very major advances our company has made in this all important area.\nAt the time of writing this report, Mermaid had accumulated 348 days without a Lost Time Injury. A fine achievement and a continuing record.", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "C. QUAY WALL (BERTH 2)\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted operation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas industry and mineral ports. This berth will offer excellent weather protection for small and medium size vessels.", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "How do I create a new document in Word?", - "target_page": 2, - "target_passage": "Just select File > New", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Create something\nBegin with a Blank document to get right to work. Or start with a template to save yourself time and steps. Just select File > New , and then select or search for the template you want.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "Summary\nAuthors can ensure that their Word documents are accessible to people with disabilities even when distributing them in PDF format using the following approach:\n1. First, they should follow the practices in Make your Word documents accessible to people with disabilities .\n2. Next, they should follow the steps in Create accessible PDFs to preserve the accessibility of the document in PDF format.\nThis article provides details about the information Word includes in the PDF to make it accessible.\n1. PDF/UA tags are included to provide semantic information about the content in the document.\n2. Decorative content does not need to be read, so it is marked as in the Content Tree in the PDF and no PDF/UA tags are included.\n3. Bookmarks for each section and slide are included to make it easier to navigate the content.", - "page_start": 55, - "page_end": 55, - "source_file": "office-pdf.pdf" - }, - { - "text": "Share and collaborate\nWith this document saved in OneDrive, you can share it with others. They don't even need Word to open it.\nTry it: Select Share , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\nYou can send the link by typing someone's email address or by copying the link and pasting it into a message or chat. If you want them to read the document but not edit it, set their permission to view-only.\nIf they don't have Word, the document will open in their web browser, in Word Online.", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "HrCreateDoc\nPublisher calls the HrCreateDoc method to specify the creation of a new, empty fixedformat document.\nC++ HRESULT HrCreateDoc( const WCHAR* wzDocExFile );\nPublisher calls the HrCreateDoc method at the beginning of the fixed-format export process to specify the creation of an empty fixed-format document. The wzDocExFile parameter specifies a name for the output file to which to write the fixed-format document.\nFor an add-in implementation, Publisher calls HrCreateDoc with the file name that the add-in provided in the call to the ExportToFixedFormat method in the Microsoft Office object model. However, because add-ins typically provide configuration UI to allow the user to specify an output file name, the add-in could disregard this file name during the export process.\nFor Microsoft Office applications that require the add-in to paginate the document, HrCreateDoc is called twice, once at the start of the pagination-calling sequence, and again after the add-in has paginated the document. For more information, see the descriptions for the HrSetPageHeightForPagination method and the HrGetPageBreaks method.", - "page_start": 12, - "page_end": 12, - "source_file": "office-pdf.pdf" - }, - { - "text": "Word\nWord PDF Accessibility", - "page_start": 0, - "page_end": 0, - "source_file": "office-pdf.pdf" - }, - { - "text": "1.1 Purpose of the Document\nThe main purpose of this document is to present a User Manual for the main user functionalities of the Portal Version 4.3 , launched in production in May 2019. This document consists of an update of the User Manual for the Portal Version 3.0 published in November 2017[4].", - "page_start": 3, - "page_end": 3, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "PUNCTUATION\n= . :, RULES: = A colon is used to introduce the second part of a sentence when the second part explains or expands upon the first part.. :, EXAMPLES: = There is only one way to fix this: we have to start over. The following items must be included with your CV: a cover letter, a copy of your ID, and a copy of your Matric. ', = Apostrophe. ', RULES: = An apostrophe is used to indicate pos- session, or to indicate that letters have been omitted from a word.. ', EXAMPLES: = Possession: The director's office was locked. Omission: He wasn't there. ('was not' becomes 'wasn't'). ', = Inverted commas. ', RULES: = Inverted commas, or quotation marks, are used to indicate direct speech, or to indicate that text is being quoted from another source.. ', EXAMPLES: = 'Where have you been?' he asked.. -, = Hyphen. -, RULES: = A hyphen is used to join words, or to join words and letters/numbers.. -, EXAMPLES: = Forming compound adjectives: rose-coloured, prize-win - ner, hand- picked Adding prefixes: pre-release, pre- production, pre-qualify, non-verbal Joining words with letters/numbers: pre-2014, X-ray, C-section.. -, = En dash. -, RULES: = En dashes are used to replace the words 'to' or 'through'.. -, EXAMPLES: = The company's financial year runs from March - February.. -, = Em dash. -, RULES: = An em dash is used to emphasise the clause that follows it, to separate a phrase from the rest of a sentence, or to indicate an interruption or change in thought.. -, EXAMPLES: = Emphasising a clause: I'm the serious one - you have all the fun. Separating a phrase: He was the one - the only one - who was brave enough to enter the building. Indicating a change/interruption: 'I really need a new - oh, never mind, I found the old one.'\nBasic English Language Skills", - "page_start": 12, - "page_end": 13, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Try it: Get help:\n1. Go to Tell me what you want to do at the top of the window.\n2. Type what you want to do.\nFor example, type:\n Add watermark to quickly get to the watermark command.\n Help to go to Word help.\n Training to see the list of Word training courses.\n What's new for a list of the most recent updates to Word", - "page_start": 7, - "page_end": 7, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Please fill in the table - one line per pre-existing right\nAnnex - Statement of contractor concerning rights to delivered results (b)\nI, [ insert name of the authorised representative of the contractor ] representing [ insert name of the contractor ], party to the [framework] [specific] contract [ insert title and number ] ('the contractor') warrant that the contractor holds all rights to the delivered results listed below [ insert titles and description of relevant results ].\nThe above-mentioned results were prepared by [ insert names of creators ]. The creators transferred all their relevant rights to the results to [the contractor] [ insert name of the rights holder ] through [an agreement] [an employment contract] [a relevant extract of] which is attached to this statement.\nThe creators [received all their remuneration on [ insert date ]] [will receive all their remuneration as agreed within [ complete ] weeks from [delivery of this statement] [receipt of confirmation of acceptance of the work]. [The statement of the creators confirming payment is attached].\nDate, place, signature\nAnnex - Statement by the creator (or right holder) (c)\nConcerning [ insert name of the relevant result ] delivered as part of the [framework] [specific] contract [ insert title and number ] concluded between the contracting authority and [ name of the contractor ]\nI the undersigned [ insert name of the creator or authorised representative of the right holder ] [representing [ insert name of the right holder ]] declare that I am the right holder of: [ identify the relevant parts of the result ] [which I created] [for which I received rights from [ insert name of other right holder ]].\nAnnankatu 18, P.O. Box 400, FI-00121 Helsinki, Finland | Tel. +358 9 686180 | Fax +358 9 68618210 | echa.europa.eu\nContract number: [complete]\nRestricted\nFWC conditions of October 2018\nI am aware of the above [framework] [specific] contract, especially Articles [I.10 and II.13] concerning intellectual property rights and exploitation of the results and I confirm that I transferred all the relevant rights to [ insert name of contractor or other intermediary right holder ].\nI declare that [I have received full remuneration] [I agreed to receive remuneration by [ insert date ]].\n[As creator, I also confirm that I do not object to the following:", - "page_start": 47, - "page_end": 48, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "AFP to PDF\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval time. AFP documents are stored more efficiently than PDF documents.\nThe PDF print stream, when it is divided into separate customer statements, is larger than AFP because each statement contains its own set of structures that are required by the PDF architecture to define a document.\nElapsed time and processor time are also essential factors in the decision-making process. The amount of time (elapsed and CPU) that is needed to convert the document depends on how large the document is and how many resources or fonts are associated with the document.\n208\nIBM Content Manager OnDemand Guide", - "page_start": 231, - "page_end": 231, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "Where can I find other Microsoft quick start guides?", - "target_page": 4, - "target_passage": "To download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Get other Quick Start guides\nTo download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "Quick Start Guide\nNew to Word? Use this guide to learn the basics.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "Welcome to Microsoft Teams\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help you get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team.", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "The Quick Analysis Button\nThe Quick Analysis button appears when a range is selected in a worksheet. Clicking on the button displays the Quick Analysis gallery which contains quick analysis tools that can be applied to the selected data.\nThe tools have been organised along tabs at the top -\nFORMATTING , CHARTS , TOTALS , TABLES , and SPARKLINES .\nWhen you click on a tab, options specific to that tab are presented.\nLive Preview with some of these tools to create the Quick Analysis tools.", - "page_start": 35, - "page_end": 35, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Handy to Know…\n Chart layouts are predefined themes created by Microsoft. Even if you choose one of these layouts you can still make your own modifications to the way the elements and objects are positioned and how they appear.\nMicrosoft Excel", - "page_start": 53, - "page_end": 53, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "For Your Reference…\nMicrosoft Excel\ntools provide a way of seeing what the different charts will look like without having to first create the chart.", - "page_start": 37, - "page_end": 37, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Using Quick Analysis Tools With Live Preview\nMost of the Quick Analysis tools in the Quick Analysis gallery provide a Live Preview of the changes in the worksheet when you point to an option.\nThis is very useful if you are not sure of the formatting or type of analysis you require as it provides you with a preview of what the data would look like if you selected that specific option.\nAt the right we have selected only the totals from the worksheet shown above. We have pointed to options from the TOTALS tab ( % Total and Average ) and from the FORMATTING tab ( Data Bars ).\nLive Preview has either presented another row of analysed data or has formatted the selection accordingly.\nAll of these tools are also available on the ribbon but using the Quick Analysis tools is much quicker.\nITTraining@sgul.ac.uk\nPage 32\nSt. George's Information Services\nMicrosoft Excel", - "page_start": 35, - "page_end": 35, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Completed:\nBefore starting this exercise you MUST have completed all of the topics in the chapter The Quick Analysis Tools…\n Open the workbook PE_Quick Analysis.xlsx (it can be found in the same folder as the student files)\n\n Use the Quick Analysis tools to apply a colour scale to the data in the worksheet\n\n Use the Quick Analysis tools to create a chart for the Overheads data. This chart should be a clustered column chart that has the column headings as the x axis, and displays the legend at the bottom of the chart. Make the chart title Cost of Overheads .\n\n Reposition the chart below the data\n\n Use the Quick Analysis tools to create Sparklines for the Qtr1 to Qtr4 and Total columns for Overheads\nYour worksheet should appear as shown on the following page…\n\n Use the Save As command to save the workbook as PE_Quick Analysis (Completed).xlsx\n\nITTraining@sgul.ac.uk\nPage 38\nSt. George's Information Services\nMicrosoft Excel", - "page_start": 41, - "page_end": 41, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "QUICK FORMATTING\nThe first tab in the Quick Analysis gallery is FORMATTING . This tab provides access to the conditional formatting tools of Excel. These are the tools that allow you to analyse data by\ncolouring it or presenting it in a slightly different way. In the Quick Analysis gallery you can apply data bars, colour high and low values, values over or below a value, and more.", - "page_start": 36, - "page_end": 36, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "QUICK SPARKLINES\nSparklines are mini charts that are embedded into a worksheet, usually immediately adjacent to the data. Sparklines are only relatively new in Excel and probably haven't gained the\nacceptance or understanding that Microsoft would like. So, you'll now find them in the Quick Analysis tools where you can easily implement them without too much head scratching.", - "page_start": 39, - "page_end": 39, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "How to connect to my Microsoft account from Word?", - "target_page": 2, - "target_passage": " Click File > Account to sign in with your Microsoft account", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Chapter 12 Web Protégé\nyou will be prompted to create a user ID (your email address) and a password. Once you do that you should have a fresh Web Protégé workspace. Figure 12.1 shows what my Web Protégé workspace currently looks like. Most of the projects are owned by me although note that the CODO project is owned by my colleague Biswanath Dutta. However, I still have complete access to that ontology due to the way Biswanath has configured my access as being able to both view and edit the ontology.\nTo upload the Pizza ontology, select the large Create New Project button. This will bring up the window shown in figure 12.2. Fill out the project name and description, then select the Choose File button and navigate to where you have the latest version of the Pizza tutorial with data. Note that in the figure I have already done this navigation so there is a value for the file to load. You can leave the Language field blank. Once you have all the fields set up similar to figure 12.2 click the Create New Project button on this dialog (note this is a different button than the one you started from).\nFigure 12.2 The Create New Project Dialog\nYour workspace should now include your first project. Click on the three horizontal bars at the far right of the project. This should bring up a pop-up menu. Select the Open option. This should bring you into the main Web Protégé UI to browse an ontology.\nBefore you make changes to the ontology you need to make sure the settings for new entities and rendering are consistent with the settings you used for the Pizza ontology. The default in Web Protégé as with Protégé is to use Auto-Generated UUIDs rather than user supplied names. If you aren't sure about these settings you can go back to exercise 2 at the beginning of chapter 4 and chapter 7 to refresh your memory. There are excellent reasons to use auto-generated UUIDs but for beginners, especially for those who want to learn SPARQL, I think they make learning the basics more difficult so we have been using the alternative of user supplied names. At the top of the Web Protégé UI in the right corner there are\n84", - "page_start": 84, - "page_end": 84, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Access files anywhere\nNeed to work on the go and across different devices? Click File > Account to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "Add visuals with pictures from the web\nWord works with Bing to give you access to thousands of pictures you can use in your documents.\nTry it: Hit enter after this line to make a blank line:\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures , and then search for something, like puppy clip art .\n2. Select the picture you want, and select Insert .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Share your work with others\nTo invite others to view or edit your documents, select the Share button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "Share and collaborate\nWith this document saved in OneDrive, you can share it with others. They don't even need Word to open it.\nTry it: Select Share , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\nYou can send the link by typing someone's email address or by copying the link and pasting it into a message or chat. If you want them to read the document but not edit it, set their permission to view-only.\nIf they don't have Word, the document will open in their web browser, in Word Online.", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "A clear statement of your intention to resign.\nExample:\n'Please accept this letter as formal notice of my resignation from my post as Assistant IT Manager at XYZ.'", - "page_start": 48, - "page_end": 48, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Secure your AWS account root user\n1. Sign in to the AWS Management Console as the account owner by choosing Root user and entering your AWS account email address. On the next page, enter your password.\nFor help signing in by using root user, see Signing in as the root user in the AWS Sign-In User Guide .\n2. Turn on multi-factor authentication (MFA) for your root user.\nFor instructions, see Enable a virtual MFA device for your AWS account root user (console) in the IAM User Guide .", - "page_start": 14, - "page_end": 14, - "source_file": "serverless-core.pdf" - }, - { - "text": "Secure your AWS account root user\n1. Sign in to the AWS Management Console as the account owner by choosing Root user and entering your AWS account email address. On the next page, enter your password.\nFor help signing in by using root user, see Signing in as the root user in the AWS Sign-In User Guide .\n2. Turn on multi-factor authentication (MFA) for your root user.\nFor instructions, see Enable a virtual MFA device for your AWS account root user (console) in the IAM User Guide .", - "page_start": 41, - "page_end": 41, - "source_file": "serverless-core.pdf" - }, - { - "text": "4.3.1 System setup wizard\nWhether you are redirected from your PC or notebook after completing system initialization or you browse to the management IP address manually, you must complete the system setup wizard to define the basic settings of the system.\nNote: The first time that you connect to the management GUI, you are prompted to accept untrusted certificates because the system certificates are self-signed.\nYou can install certificates that are signed by a trusted certificate authority after you complete system setup. For more information about how to perform this task, see 4.5, 'Configuring secure communications' on page 117.\nComplete the following steps to successfully complete the system setup wizard:\n1. Log in to system by using the superuser account, as shown in Figure 4-7. Click Log in .\nImportant: The default password for the superuser account is passw0rd (with the number zero and not the capital letter o).\nFigure 4-7 System setup: Logging in for the first time\nChapter 4. Initial configuration\n93\n94\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n2. The welcome window opens, as shown in Figure 4-8. Verify the prerequisites and click Next .\nFigure 4-8 System setup: Welcome\n3. Carefully read the license agreement. Select I agree with the terms in the license agreement when you are ready, as shown in Figure 4-9. Click Next .\nFigure 4-9 System setup: License agreement\nChapter 4. Initial configuration\n95\n96\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n4. Enter a new password for superuser, as shown in Figure 4-10. The valid password is 6 64 characters long and it cannot begin or end with a space. Click Apply and Next .\nFigure 4-10 System setup: Changing the password for superuser\n5. Enter the name that you want to give the new system, as shown in Figure 4-11. Click Apply and Next .\nFigure 4-11 System setup: Setting the system name\nChapter 4. Initial configuration\n97\n98\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n6. Enter the number of enclosures licensed for each function as authorized by your license agreement (see Figure 4-12). Click Apply and Next .\nNote: Encryption uses a different licensing scheme and is activated later in the wizard.\nFigure 4-12 System setup: Setting the system licenses", - "page_start": 113, - "page_end": 119, - "source_file": "sg247938.pdf" - }, - { - "text": "Handy to Know…\n If you only want to print the chart and not the data, click on the chart to select it, click on the FILE tab, then click on Print . You will notice that only the chart will appear in the preview.\nMicrosoft Excel", - "page_start": 50, - "page_end": 50, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "What are the products of Hormel Foods Corporation?", - "target_page": 4, - "target_passage": "meat and other food product", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(a) General Development of Business\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. The Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel Foods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of those products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has emphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned subsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing HORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with the operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey processing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS\nmarkets its turkey products through its own sales force and independent brokers.\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 strengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest companies providing nutritional products to the U.S. healthcare industry.\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages and sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.", - "page_start": 2, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\n(Exact name of registrant as specified in its charter)", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Competition\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with manufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. The Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and ConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc.\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong quality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then support higher value perceptions from customers.\nThe Company competes using this same strategy in international markets around the world.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\nHormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to Hormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.). 10.3 (1)(3), 1 = Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to Exhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.). 10.4 (1)(3), 1 = Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy Statement filed on December 30, 1999, File No. 001-02402.)\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n(2) These Exhibits transmitted via EDGAR.\n(3) Management compensatory plan", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\n2.1 (1), 1 = Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.). 3.1 (1), 1 = Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Products and Distribution\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and canned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows:\nPerishable meat, 1 = 50.3%. Perishable meat, 2 = 53.0%. Perishable meat, 3 = 54.7%. Nonperishable meat, 1 = 18.9. Nonperishable meat, 2 = 19.8. Nonperishable meat, 3 = 21.0. Poultry, 1 = 22.1. Poultry, 2 = 22.6. Poultry, 3 = 20.3. , 1 = 100.0%. , 2 = 100.0%. , 3 = 100.0%\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution channels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's generalpurpose financial statements.\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon meats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen processed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and supplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin products. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), Diamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\nNo new product in fiscal 2003 required a material investment of Company assets.\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned territories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of October 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by common carrier.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "(a) General Development of Business\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a presence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the Philippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the Philippines (Purefoods-Hormel, 40% holding).\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the Company have been acquired in the ordinary course of business.\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the beginning of the fiscal year.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Patents and Trademarks\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued patents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, Hormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or licensed trademarks used in the Company's segments are:\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S PRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF TSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD SMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, SWEET THING, THICK & EASY and WRANGLERS.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "FINANCIAL STATEMENT SCHEDULES\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith:", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Form 10-K (NYSE:HRL)\nPublished: January 23rd, 2004\nPDF generated by stocklight.com\nUse these links to rapidly review the document HORMEL FOODS CORPORATION TABLE OF CONTENTS", - "page_start": 0, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "Where are Hormel Foods Corporation plants located? ", - "target_page": 5, - "target_passage": "has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "HORMEL FOODS CORPORATION\n(Exact name of registrant as specified in its charter)", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "(a) General Development of Business\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. The Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel Foods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of those products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has emphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned subsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing HORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with the operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey processing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS\nmarkets its turkey products through its own sales force and independent brokers.\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 strengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest companies providing nutritional products to the U.S. healthcare industry.\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages and sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.", - "page_start": 2, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\nHormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to Hormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.). 10.3 (1)(3), 1 = Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to Exhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.). 10.4 (1)(3), 1 = Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy Statement filed on December 30, 1999, File No. 001-02402.)\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n(2) These Exhibits transmitted via EDGAR.\n(3) Management compensatory plan", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\n2.1 (1), 1 = Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.). 3.1 (1), 1 = Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Competition\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with manufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. The Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and ConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc.\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong quality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then support higher value perceptions from customers.\nThe Company competes using this same strategy in international markets around the world.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Item 2. PROPERTIES\nHormel Foods Corporation, 1 = . Hormel Foods Corporation, 2 = . Slaughtering and Processing Plants, 1 = . Slaughtering and Processing Plants, 2 = . Austin, Minnesota, 1 = 1,292,000. Austin, Minnesota, 2 = Owned. Fremont, Nebraska, 1 = 655,000. Fremont, Nebraska, 2 = Owned. Processing Plants, 1 = . Processing Plants, 2 = . Algona, Iowa, 1 = 153,000. Algona, Iowa, 2 = Owned. Aurora, Illinois, 1 = 141,000. Aurora, Illinois, 2 = Owned. Beloit, Wisconsin, 1 = 339,000. Beloit, Wisconsin, 2 = Owned. Ft. Dodge, Iowa, 1 = 17,000. Ft. Dodge, Iowa, 2 = Owned", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "FINANCIAL STATEMENT SCHEDULES\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith:", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "(a) General Development of Business\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a presence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the Philippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the Philippines (Purefoods-Hormel, 40% holding).\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the Company have been acquired in the ordinary course of business.\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the beginning of the fiscal year.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Form 10-K (NYSE:HRL)\nPublished: January 23rd, 2004\nPDF generated by stocklight.com\nUse these links to rapidly review the document HORMEL FOODS CORPORATION TABLE OF CONTENTS", - "page_start": 0, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Patents and Trademarks\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued patents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, Hormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or licensed trademarks used in the Company's segments are:\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S PRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF TSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD SMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, SWEET THING, THICK & EASY and WRANGLERS.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "Does Hormel Food Corporation have any material legal proceedings pending?", - "target_page": 8, - "target_passage": "The Company knows of no pending material legal proceedings.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Item 3. LEGAL PROCEEDINGS\nThe Company knows of no pending material legal proceedings.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\n(Exact name of registrant as specified in its charter)", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "(a) General Development of Business\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. The Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel Foods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of those products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has emphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned subsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing HORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with the operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey processing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS\nmarkets its turkey products through its own sales force and independent brokers.\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 strengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest companies providing nutritional products to the U.S. healthcare industry.\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages and sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.", - "page_start": 2, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "(a) General Development of Business\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a presence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the Philippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the Philippines (Purefoods-Hormel, 40% holding).\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the Company have been acquired in the ordinary course of business.\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the beginning of the fiscal year.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\nHormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to Hormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.). 10.3 (1)(3), 1 = Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to Exhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.). 10.4 (1)(3), 1 = Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy Statement filed on December 30, 1999, File No. 001-02402.)\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n(2) These Exhibits transmitted via EDGAR.\n(3) Management compensatory plan", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "ITEM 3. LEGAL PROCEEDINGS\nFrom time to time we and our subsidiary banks are parties to lawsuits arising in the ordinary course of our banking business. However, there are no material pending legal proceedings to which we, our subsidiary banks or our other direct and indirect subsidiaries, or any of their properties, are currently subject. Other than regular, routine examinations by state and federal banking authorities, there are no proceedings pending or known to be contemplated by any governmental authorities.", - "page_start": 38, - "page_end": 38, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\n3.2 (1), 1 = Bylaws as amended to date. (Incorporated by reference to Exhibit 3.2 to Hormel's Amendment No. 3 to Registration Statement on Form S-4, dated November 29, 2001, File No. 333-68498.). 4.1 (1), 1 = Indenture dated as of June 1, 2001, between Hormel and U.S. Bank Trust National Association, as Trustee relating to certain outstanding debt securities. (Incorporated by reference to Exhibit 4.1 to Hormel's Registration Statement on Form S-4 dated, August 28, 2001, File No. 333-68498.). 4.2 (1), 1 = Supplemental Indenture No. 1 dated as of June 4, 2001, to Indenture dated as of June 1, 2001, between Hormel and U.S. Bank Trust National Association, as Trustee, relating to certain outstanding debt securities. (Incorporated by reference to Exhibit 4.2 to Hormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.). 4.3 (1), 1 = Letter of Representations dated June 5, 2001, among Hormel, U.S. Bank Trust National Association, as Trustee, and The Depository Trust Company relating to certain outstanding debt securities of Hormel. (Incorporated by reference to Exhibit 4.3 to Hormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.). 4.4 (1), 1 = Pursuant to Item 601 (b)(4)(iii) of Regulation S-K, copies of instruments defining the rights of holders of certain long-term debt are not filed. Hormel agrees to furnish copies thereof to the Securities and Exchange Commission upon request.. 10.1 (1), 1 = U.S. $150,000,000 Credit Agreement, dated as of October 20, 2003, between Hormel, the banks identified on the signature pages thereof, and Citicorp U.S.A. Inc., as Administrative Agent. (Incorporated by Reference to Exhibit 10.1 to Hormel's Current Report on Form 8-K dated October 23, 2003.). 10.2 (1)(3), 1 =", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL FOODS CORPORATION\n2.1 (1), 1 = Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.). 3.1 (1), 1 = Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Products and Distribution\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and canned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows:\nPerishable meat, 1 = 50.3%. Perishable meat, 2 = 53.0%. Perishable meat, 3 = 54.7%. Nonperishable meat, 1 = 18.9. Nonperishable meat, 2 = 19.8. Nonperishable meat, 3 = 21.0. Poultry, 1 = 22.1. Poultry, 2 = 22.6. Poultry, 3 = 20.3. , 1 = 100.0%. , 2 = 100.0%. , 3 = 100.0%\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution channels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's generalpurpose financial statements.\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon meats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen processed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and supplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin products. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), Diamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\nNo new product in fiscal 2003 required a material investment of Company assets.\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned territories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of October 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by common carrier.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "FINANCIAL STATEMENT SCHEDULES\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith:", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What is Mexican Farm Subsidies ?", - "target_page": 9, - "target_passage": "an online tool to analyze how the federal government allocates those subsidies", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "2.2.2. Bringing nature back to agricultural land\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are among the first to feel the consequences when biodiversity is lost but also among the first to reap the benefits when it is restored. Biodiversity enables them to provide us with safe, sustainable, nutritious and affordable food and provides them with the income they need to thrive and develop. European farmers are an essential part of the EU's future and must continue to be the social and economic hub of many communities across our Union.\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. This is why it is important to work with farmers to support and incentivise the transition to fully sustainable practices . Improving the condition and diversity of agroecosystems will increase the sector's resilience to climate change, environmental risks and socioeconomic shocks, while creating new jobs, for example in organic farming, rural tourism or recreation.\nTo support the long-term sustainability of both nature and farming, this strategy will work in tandem with the new Farm to Fork Strategy and the new Common Agricultural Policy (CAP) , including by promoting eco-schemes and result-based payment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the Commission will closely monitor progress and improvements in terms of food security and farmers income. The Commission will ensure that the CAP Strategic plans are assessed against robust climate and environmental criteria, and that Member States set explicit national values for the relevant targets set in this strategy, as well as in the Farm to Fork Strategy. These plans should lead to sustainable practices such as precision agriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent grassland, and stricter animal welfare standards.", - "page_start": 7, - "page_end": 7, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "2.2.2. Bringing nature back to agricultural land\nAgroecology can provide healthy food while maintaining productivity, increase soil fertility and biodiversity, and reduce the footprint of food production. Organic farming in particular holds great potential for farmers and consumers alike. The sector creates jobs and attracts young farmers. Organic farming also provides 10-20 % more jobs per hectare than conventional farms, and creates added value for agricultural products 32 . To make the most of this potential, at least 25% of the EU's agricultural land must be organically farmed by 2030 . In addition to CAP measures, the Commission will put forward an Action Plan on organic farming, helping Member States stimulate both supply and demand of organic products. It will also ensure consumer's trust through promotion campaigns and green public procurement. In the implementation of the EU-wide agroecological targets set out in this strategy and in the Farm to Fork Strategy, the different starting points and differences in progress already made in Member States will be taken into account.\nThe uptake of agroforestry support measures under rural development should be increased as it has great potential to provide multiple benefits for biodiversity, people and climate.\nThe decline of genetic diversity must also be reversed, including by facilitating the use of traditional varieties of crops and breeds. This would also bring health benefits through more varied and nutritious diets. The Commission is considering the revision of marketing rules for traditional crop varieties in order to contribute to their conservation and sustainable use. The Commission will also take measures to facilitate the registration of seed varieties, including for organic farming, and to ensure easier market access for traditional and locally adapted varieties.", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "· Mexico\n· Mexican Farm Subsidies - an online tool to analyze how the federal government allocates those subsidies\n· Compare Your School : compares aggregate test results from any school with the municipal, regional, and national averages\n· Rebellion of the Sick built for patients with chronic diseases whose expenses are not covered by the government subsidized health coverage.\n· Argentina: Public Spending in Bahía analyzes how public funds are used.\n· Colombia: Visible Congress monitors the actions of the Colombian congress\n· Brazil\n· Eleitor 2010 : a website to submit reports of electoral fraud during the Brazil 2010\n9/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", - "page_start": 8, - "page_end": 8, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "2.2.2. Bringing nature back to agricultural land\nFarmland birds and insects, particularly pollinators, are key indicators of the health of agroecosystems and are vital for agricultural production and food security. Their alarming decline must be reversed. As set out in the Farm to Fork Strategy, the Commission will take action to reduce by 50% the overall use of - and risk from chemical pesticides by 2030 and reduce by 50% the use of more hazardous pesticides by 2030. This must be supported by the full implementation of the EU Pollinators initiative 31 . By the end of 2020, the Commission will review the initiative and propose additional measures if necessary. To provide space for wild animals, plants, pollinators and natural pest regulators, there is an urgent need to bring back at least 10% of agricultural area under high-diversity landscape features . These include, inter alia , buffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, terrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion and depletion, filter air and water, and support climate adaptation. In addition, more biodiversity often helps lead to more agricultural production. Member States will need to translate the 10% EU target to a lower geographical scale to ensure connectivity among habitats, especially through the CAP instruments and CAP Strategic Plans, in line with the Farm to Fork Strategy, and through the implementation of the Habitats Directive. The\n31 EU Pollinators initiative (COM(2018) 395).\n7\nprogress towards the target will be under constant review, and adjustment if needed, to mitigate against undue impact on biodiversity, food security and farmers' competitiveness.", - "page_start": 7, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "CONSOLIDATED FIVE-YEAR SUMMARY\nNotes: 1. Unit sales in Mexico are included in 'North America.'\n2. Sales and Production for Europe and Mexico for each year are on a January to December basis. (In the annual reports for the fiscal years before 2003, production for Europe and Mexico was on April to March basis.)\nNissan Annual Report 2004", - "page_start": 71, - "page_end": 71, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Results\nAccording to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. /T_he United States accounts for more than 32%; China accounts for about 24%; Brazil, Argentina and Mexico account for about 23%. /T_he /fluctuation of maize production in these /five top countries will have a signi/ficant impact on the global maize trade. Based on the simulation results, comparing to 1986-2005, the maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss rate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. However, there would be increasing trends in the United States and Mexico; the change in the United States would not be signi/ficant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming\nScientific Reports | (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\n;\nwww.nature.com/scientificreports/\nFigure 5. (continued)\nby 1.5 °C. According to the simulation results, comparing to 1986-2005, the maize yield in the United States, China and Brazil would decrease under global warming by 2.0 °C; the yield loss rate would reach more than 24% in Brazil; the United States would decrease by 13.3%; China would decrease by 11.5%. However, there would be increasing trends in Argentina and Mexico; the maize yield would increase by 16.8% in Argentina; the yield increasing rate would exceed 40% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 11.4% under global warming by 2.0 °C. By comparing the maize production in di/fferent countries, it can be found that the reduction trend of total maize production in the top /five countries is more obvious, especially under the scenario of global warming by 2.0 °C, the global food trade and food security may face greater risks.", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed9.pdf" - }, - { - "text": "Roundtable session: SMBC Food and Agricultural Assessment Loan\nA roundtable session with experts held in August 2011 considered the role of the new SMBC Food and Agricultural Assessment Loan in improving the food supply chain that links food and fishery producers with food processors and consumers. Opinions were also exchanged on what other future role the bank might assume in this regard, given the current situation and issues facing the food industry\nand agriculture in Japan.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "GREENHOUSE POLICY\nSantos released its Greenhouse Policy in 2004 to drive performance improvements in this area through reducing emissions and producing oil and gas more efficiently.\nSantos' Greenhouse Policy is being rolled out across the organisation through crossfunctional greenhouse gas teams that have the right skill sets and responsibilities to progress this initiative. These teams will manage Greenhouse Policy and regulation, carbon management and trading opportunities, and energy efficiency. A key internal driver for emissions reduction will be the promotion of energy efficiency.\nSantos is committed to achieving effective emission reduction targets, to the pursuit of energy efficiency strategies and to the identification and implementation\n27\n28\nSantos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos' three-year commitment to the Our Patch project.\nof opportunities to use fewer greenhouse-emitting or renewable sources of energy.\nTo achieve these commitments Santos is actively pursuing an emissions intensity reduction target (greenhouse emissions per unit of production) of 20% in the period from 2002 to 2008.", - "page_start": 28, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Raw Materials\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize the seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog producers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the industry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not eliminated the sensitivity of Company results to raw material supply and price fluctuations.\nLivestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term supply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the Company's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly moving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer hogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of slaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply contracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the longterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot market to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent of its hogs under long-term supply contracts.\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey products. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout Minnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs.", - "page_start": 3, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Discussion and conclusion\n/T_hirdly, there are relatively more researches on the prediction of climate change trend under the background of 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in worldwide is few. In the meantime, we do not assess the e/ffect of future changes on agriculture, such as increases in farm productivity due to new technology. /T_he maize planting area in the future is assumed to be the same as the current situation of maize cultivation in the world.\nConclusion. According to the simulation results, the yield of maize under global warming by 2.0 °C would decrease between 3.0 and 18.7% in the worldwide relative to 1986-2005; the maize yield would /fluctuate between - 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 high-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% under global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among di/fferent countries and regions. So, it is urgent for all countries to pay enough attention to the loss risk of maize yield and take actions of mitigation and adaptation to climate change. /T_he time le/f_t for changing our minds and actions is becoming less and less.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What concerns has open data raised in the insurance sector?", - "target_page": 23, - "target_passage": "insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "3. Emerging trends and issues related to Open Data\nOne of the most common activities for Open Data activists in this moment is the creation of country-wide catalogs of all data sources, to facilitate individuation and correlation of independent data sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation blog and/or its data hub CKAN. Another relevant development is the publication of an Open Data Manual that \"can be used by anyone but is especially designed for those seeking to open up data, since it discusses why to go open, what open is, and the how to 'Open' Data.\" Activists in several European countries have already published local versions of the manual, or equivalent documents. On this background, several interesting issues, some of which were anticipated in the Open Data, Open Society report, are coming in full light. They are presented, one at a time, in the following sections of this chapter.", - "page_start": 10, - "page_end": 10, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "5. Bibliography\nBesides those explicitly linked from the text, this report has drawn inspiration by many other resources. The most important ones are listed here, but the complete list should be much longer. We wish to thank first the authors of the works listed below and, immediately after, to all the activists, inside and outside governments worldwide, who are working on this topic.\n1. Are you prepared for the pitfalls of Gov 2.0?\n2. Can we use Mobile Tribes to pay for the costs of Open Data?\n3. Canada launches data.gc.ca - what works and what is broken\n4. Creative Commons and data bases: huge in 2011, what you can do\n5. Defining Gov 2.0 and Open Government\n6. How Government Data Can Improve Lives\n7. If you like solar, tell your utility to publish this map\n8. Indian corruption backlash builds after \"year of the treasure hunters\"\n9. Información Cívica / Just What is Civic Information?\n10.Is open government just about information?\n11.LSDI : In un click la mappa del crimine\n12.La casta è online: dategli la caccia!\n13.Linee guida UK sull'opendata\n14.MSc dissertation on Open Government Data in the UK\n15.Open Data (2): Effective Data Use .\n16.Open Data: quali prospettive per la pianificazione?\n17.Open Knowledge Foundation Blog \" Blog Archive \" Keeping Open Government Data\nOpen?\n18.Open data, democracy and public sector reform\n19.Pubblicato Camere Aperte 2011 - blog - OpenParlamento\n20.Reasons for not releasing data in government\n21.The impact of open data: first evidence\n33/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", - "page_start": 32, - "page_end": 32, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "1. Introduction\nThis report is the final deliverable of the Open Data, Open Society research project. It follows the publication of the Open Data, Open Society report, finished in late October 2010 and published in early January 2011. That first report focused on explaining the critical importance of digital data in contemporary society and business activities; defining Open Data; giving examples on their potential, especially at the local level, on transparency and economics activities; finally, defining summarizing some general best practices.\nThis second report looks at what happened in the Open Data arena after October 2010. After some considerations on the general social and political background in late 2010/early 2011, it is divided in two main parts. The first describes some emerging trends and issues related to Open Data, that got minor or no coverage in the first report. The second part discusses some practices and actions to follow to deal with those trends and issues.", - "page_start": 2, - "page_end": 2, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "2.3. Open Data in Latin America, Asia and Africa\nSeveral countries in Latin America are studying and making experiments with Open Data both at the government and at the grassroots level. The same is happening, on a much smaller scale, in a few parts of Asia and Africa. On average, the volume of these Open Data experiments and the level of local interest and awareness around them is still lower than what is happening in Europe and North America. In spite of this we suggest that it is important, for public officials and civic activists in Western Countries, to follow these developments closely. The reason is that they may turn into very useful test beds for all the strengths and limits of Open Data, especially those not encountered yet where the movement was born.\nIn fact, the original discourse and arguments around Open Data are heavily Western centric. The problem they want to solve is how to make democracy work better in countries where it already exists and which share a great amount of history and cultural/philosophical values .\nOther countries face very different challenges, from the philosophical level to the practical one. A common issue in developing countries, for example, is that there is very little to open simply because much PSI (Public Sector Information) doesn't exist in digital format yet. Therefore, the first thing to do is to create data, normally through outsourcing and crowd sourcing.\nOther issues, that will be discussed in detail in other sections of the report because they are also present in Europe in different forms, are related to lack of equal opportunities for access to data and serious fears (sometimes, concrete, sometimes caused by confusion about what should be open and how) that data will be used against citizens. A commenter to Gurstein's Open Data: Empowering the Empowered or Effective Data Use for Everyone? said:\nin Delhi and Mumbai, mobs and rioters managed to get information about particular identity groups through voter rolls: openness is, in certain situations, a precarious virtue. It is almost certain that Open Data would be used to rig election but here again openness is not the issue, they would find it anyway...\nSo far, the main interest about Open Data in Asian countries seems limited, so to speak, to its effects on transparency in politics. At a two-weeks programming contest held at the end of 2010 in Thailand, for example, one of the most appreciated entries was a software scraper of the Thailand's Member of House of Representative Website, that made it possible for everybody to create applications using those data.", - "page_start": 7, - "page_end": 7, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "4.1. Properly define and explain both Open Data and Public Data\nJust because Open Data is becoming more popular (and, we may say, more and more necessary every year), it is essential to intensify efforts to explain, both to the general public and to public administrators, that\n1. Privacy issues are almost always a non-issue. Quoting from What \"open data\" means and what it doesn't): Privacy and/or security concerns with putting all the government's data out there are a separate issue that shouldn't be confused with Open Data. Whether data should be made publicly available is where privacy concerns come into play. Once it has been determined that government data should be made public, then it should be done openly.\n2. Defining as Public and consequently opening them in the right way, much more data than those born and stored inside Public Administration is an urgent task that is in the best interest of all citizens and businesses", - "page_start": 26, - "page_end": 26, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "3.6.1. Data alterations and financial sustainability\nSome concerns about the limits of Open Data are about what may happen, or stop to happen, before they are published online. The most common concerns of this type are (from Open Public Data: Then What? - Part 1):\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as private property by private corporations, because the public agencies whose job was to produce those data, can't sell them anymore.\n2. total accessibility of data provides more incentives to tinker with them, at the risk of reducing trust in institutions and inhibiting decision-making even more than today.\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account is that, once data are open, routinely used and monitored by as many independent users as possible, even the cost of keeping them up to date may be sensibly reduced: in other words, in the medium/long term Open Data may reduce the need to periodically perform complete, that is very expensive, studies and surveys to update a whole corpus of data in one run.\nBesides, and above all, even if opening data always destroyed any source of income for the public office that used to create and maintain them, this problem would only exist for the PSI datasets that are already sold today. Such data, even if of strategic importance as is the case with digital cartography, are only a minimal fraction of all the PSI that could and should be opened to increase transparency, reduce the costs of Government and stimulate the economy. In all these other cases:\n· the money to generate the data already arrives by some other source than sales and licensing(but even with those data it may be possible to generate them by crowdsourcing, thereby reducing those costs!)\n· the only extra expense caused by publishing those data online (assuming they're already available in some digital format, of course!), would be the hosting and bandwidth costs, that may be greatly reduced by mirroring and other technical solutions like torrents, already widely used to distribute Free/Open Source Software (FOSS) through the Internet.", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "2.2. Data Openness in EU\nBoth the interest and the need for data openness at the European Union level remain high. Here, without making any complete analysis, we'll only report and comment a few relevant episodes. While studies continue to point at the political and economical advantages of Open Data, great inefficiencies and delays still keep the time and cost savings that could be achieved a far goal for the European Union.\nAll the principles of the Open Declaration (collaboration, transparency, empowerment) have been declared key areas of action of the new EC eGov action plan. Particularly important, as explained\n6/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nby David Osimo in EU eGov action plan published: the good, the bad and the unknown, are the actions on Open Data (a EU portal and a revision of the EU PSI directive), and on citizens control over their data. However the Action Plan contains no reference to the need for a more open and collaborative governance.\nIn the case of European Structural Funds, as Luigi Reggi reported in March 2011:\nthere is no single point of access to the data. Hundreds of Managing Authorities are following different paths and implementing different information strategies when opening up their data.\nMany databases (often simple PDF lists) [...show...] huge variation not only in the way they can be accessed but also in content and quality of data provided.\n... [...The results of...] an independent web-based survey on the overall quality of data published by each Managing Authority responsible for the 434 Operational Programmes approved in July 2009... can be summarized as follows:\nThe use of open, machine-processable and linked-data formats have unexpected advantages in terms of transparency and re-use of the data by the public and private sector. The application of these technical principles does not need extra budget or major changes in government organization and information management; nor does it require the update of existing software and infrastructures. What is needed today is the promotion among national and local authorities of the culture of transparency and the raising of awareness of the benefits that could derive from opening up existing data and information in a re-usable way.", - "page_start": 5, - "page_end": 6, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "3.6.2. Real impact of data manipulation or misunderstanding\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but to simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance of occasions to secretly play with data and how they are managed is a symptom of excessive, or peak complexity: again, problems and risks with Open Data are a symptom of a [pre-\n17/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nexisting] problem that is somewhere else.\nRegardless of the real probability of data alterations before they are published, the major problem happens after. We already mentioned in the first report the fact that, while correct interpretation of public data from the majority of average citizens is absolutely critical, the current situation, even in countries with (theoretical) high alphabetization and Internet access rates, is one in which most people still lack the skills needed for such analysis. Therefore, there surely is space for both intentional manipulation of PSI and for misunderstanding it. After the publication of the first report, we've encountered several examples of this danger, which are reported in the rest of this paragraph.\nBefore describing those cases, and in spite of them, it is necessary to point out one thing. While the impact on the general public (in terms of raising interest and enhancing participation) on the Open Data activity of 2010 is been, in many cases and as of today, still minimal, it is also true that there has been no big increase in demagogy, more or less manipulated scandals and conflictual discussion caused by Open Data. There has certainly been something of this in the Cablegate but that's not really relevant because, as we've already explained, what Wikileaks did is intrinsically different from Open Data. So far, negative or at least controversial reactions by manipulation and misunderstanding of Open Data haven't happened to such a scale to justify not opening PSI.\nThis said, let's look at some recent example of misunderstanding and/or manipulation based on (sometimes open) public digital data.\nNicolas Kayser-Bril mentioned a digital map of all the religious places in Russia, that shows [also] \"mosques that are no longer in use, so as to convey the idea that Muslims were invading Russia.\"", - "page_start": 16, - "page_end": 17, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "elections\n· Open Congress : a tool for political scientists to track the work and effectiveness of the Brazilian congress\n· Paraguay: Who Do We Choose?: lists profiles of all candidates for many public posts.\nIn Brazil, the principle that \"what is not confidential should be available on the Internet in the open data format\" is already discussed and, in principle, accepted, by some departments of the Brazilian federal government. However, the preferred practice for now is (if there are no other obstacles) to only publish data that have been explicitly requested by some citizens.\nA report presented in May 2011 at the First Global Conference on Transparency Research mentioned a couple of Open Data issues in Latin America that are worth noting, because they're present even in Europe and North America, in spite of the different historical and social background:\n· \"Better coordination is needed between right to information campaigners and open data activists.\"\n· \"If activist manage to target particular topics to add \"value\" to the discussion, demand for open data could eventually increase in the region.\"\nIn Africa, mobile phones are much more available, and more essential than computer with Internet access, often bypassing the need for real desktop PCs with many applications. Therefore, from a purely technical point of view, transparency, accountability and efficiency in government are quickly becoming accessible to most African citizens through mobile networks rather than through the \"traditional\" Internet. However, there are still too few public departments and procedures that use digital documents and procedures on a scale large enough to generate meaningful volumes of digital data that could be then published online.\nWhile we write, Kenya is laying the legal groundwork to support Open Data. Permanent Secretary for Information and Communications, Dr. Bitange Ndemo is reported as having been championing for quite some time. In practice, big challenges remain for Open Data usage in Kenya. The easiest one to solve is to technical, that is find skilled people that can package the data in ways that the public can consume (even on mobile phones...). The real problem, however, is the fact that (summarizing from Thinking About Africa's Open Data):\nThere is a lot of Kenya data but it isn't accessible. The entities that hold the most public and infrastructure data are always government institutions. Getting information from them can be very hard indeed. We don't know who to go to to get the data we need, and\n10/34", - "page_start": 9, - "page_end": 9, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "4.6. Focus on local, specific issues to raise interest for Open Data\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens to use Open Data in their political, economic and professional decisions, one of the final recommendations of the Open Data, Open Society report confirms its importance and needs to be repeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of citizens that demand and use Open Data in the shortest possible time, to practice all the recommendations of this report at the local level ,\nMost people encounter their local governments much more often then their national ones. When working within a single city or region it is much easier to inform citizens, raise their interest and involve them, because they would be searching local solutions to improve local services and/or save local money. There may also be much more opportunities to do so, especially in this period of financial crisis that will see substantial decreases both in credit by financial institutions and in subsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\" must be the keys for local activists and public employees working on local Open Data:\n· work on specific issues and with precise objectives\n· focus on immediate usefulness\n· work on demand, on the services that people want. Required services define what data must be open, not the contrary\nThis is the most effective, if not the only strategy, to solve one of the biggest debates in open data: \"how do we get people to use the data that we publish?\" . The right question, instead, is \"what data do people want?\". Even if citizens don't realize yet that what they actually want is more Open Data, or that what they need can be done more quickly and cheaply by releasing some information in that way.\nA great example of what all this means is the Great British Public Toilet Map: a public participation\n31/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nwebsite that tracks which councils have published public toilet open data, and which have not. A map like this solves one specific, concrete problem in the ordinary, daily life of many people: \"Many older people have continence concerns and only go to places where they know there is a toilet. \"", - "page_start": 30, - "page_end": 31, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What are Steinberg's concerns about the government releasing all non-private existing data?", - "target_page": 28, - "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "4.1. Properly define and explain both Open Data and Public Data\nJust because Open Data is becoming more popular (and, we may say, more and more necessary every year), it is essential to intensify efforts to explain, both to the general public and to public administrators, that\n1. Privacy issues are almost always a non-issue. Quoting from What \"open data\" means and what it doesn't): Privacy and/or security concerns with putting all the government's data out there are a separate issue that shouldn't be confused with Open Data. Whether data should be made publicly available is where privacy concerns come into play. Once it has been determined that government data should be made public, then it should be done openly.\n2. Defining as Public and consequently opening them in the right way, much more data than those born and stored inside Public Administration is an urgent task that is in the best interest of all citizens and businesses", - "page_start": 26, - "page_end": 26, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "4.3. Keep past and future separate\nFor the same reason why it is important to always distinguishes between political and economical advantages (or disadvantages) of Open Data, it is necessary to keep decisions about future data (those that will arrive in the future, due to new contracts, public services and so on) separate from those about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that Government should publish everything non-private it can now is \"rather dangerous\", and that it would be much better to release nothing until someone actually asked for it, and at that point doing it right, that is with an open license and so on. The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\" . The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them.\nEven if these concerns were always true, it is important to realize that they apply (especially the second) to already existing data, not to future ones. The two classes of data have, or can have, very different constraints. Existing data may still exist only in paper format and/or be locked by closed or unclear licenses, or not relevant anymore for future decisions.\nOpening future data, instead, is almost always more important, useful urgent, easier and cheaper than digitizing or even only reformatting material that in many cases is already too old to make immediate, concrete differences. While this argument is probably not always true when we look at Open data for transparency, it probably is when it comes to economic development.\nTherefore, features and guidelines that should be present in all future data generation and management processes include:\n· standardization: the less, obviously open, formats are used for data of the same type, the easier it is to merge and correlate them. The formats that have to be standardized are not only those at the pure software level. Even more important is, for example, to adopt by law standard identificators for government suppliers, names and machine-readable identifiers of budget voices and so on\n· preparation for future digitization: new digital systems should explicitly be designed from the beginning so that it will be possible, when non-digital records will be digitized, to add them to the databases without modifying losses.\n· Open licenses", - "page_start": 27, - "page_end": 27, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "2. Social and political landscape\nmore concrete over time is damage control. In a world that produces digital data without interruption, uncontrolled and unpredictable data releases are facts of life that are very hard to predict, practically impossible to avoid and increasingly common. Opening public government data, that is providing plenty of officially verified information, becomes therefore also a damage control solution, to prevent or at least minimize damages from such uncontrolled releases. Without official Open Public Data, individual citizens, political parties or other organizations will start to process and compare (if they already aren't...) data from unofficial sources anyway, maybe from different countries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong conclusions. This is not some theoretical possibility far in the future, as this real world example (from a comment to an Open Data discussion in an italian blog) proves:\n\" on the [non italian] Geonames website you can download geo-referenced data about... 47000 Italian municipalities. That worries me, because there are only 8094 of them. Besides, I grabbed a few random data about population, and I can guarantee you that not one was right. What should be done in such cases?\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they suggest that, considering its current needs and problems, current societies want and need more Open Data than they already have.", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "3.3. Legal issues remain crucial\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this rule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing Eaves, until a government get the licensing issue right, Open Data cannot bring all the possible benefits in that country. If there are no guarantees that public data can be used without restriction, very little happens in practice, and when it happens it may be something against the public interest.\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process and analyze official crime data, also publishes online, with a proprietary license, anonymized summaries of those data. When in 2010 another company, Report See Inc, scraped those data from their website to reuse them, Public Engines sued.\nReporting this, D. Eaves rightly points out that both companies are right: one is trying to protect its investment, the other is simply trying to reuse what IS public data, by getting it from the ONLY place where it's available. This is what happens when public officials leave the ownership of public data to the third parties hired to collect them. Please note that, in practice, it makes very little difference whether those third parties are private, for-profit corporations or even other Public Administrations. Unless, of course, there are national laws already in place that define in advance what is the license of all present and future Public Data, no matter how they were generated and by whom , those data can be lost in any moment for society. In all other cases, the legal status of data will be either officially closed and locked, or uncertain enough to prevent most or all reuses. In February 2011, the news came that, even if they weren't the original copyright holders, Public Engines had been able to put together enough legal claims to convince Report See to give up.\nDisputes like this should not happen and would not happen if all contracts regarding collection and management of PSI clearly specified that all the resulting data either go directly into the public domain (after being anonymized if necessary, of course) or remain exclusive property of the\n13/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", - "page_start": 12, - "page_end": 12, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "3.6.1. Data alterations and financial sustainability\nSome concerns about the limits of Open Data are about what may happen, or stop to happen, before they are published online. The most common concerns of this type are (from Open Public Data: Then What? - Part 1):\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as private property by private corporations, because the public agencies whose job was to produce those data, can't sell them anymore.\n2. total accessibility of data provides more incentives to tinker with them, at the risk of reducing trust in institutions and inhibiting decision-making even more than today.\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account is that, once data are open, routinely used and monitored by as many independent users as possible, even the cost of keeping them up to date may be sensibly reduced: in other words, in the medium/long term Open Data may reduce the need to periodically perform complete, that is very expensive, studies and surveys to update a whole corpus of data in one run.\nBesides, and above all, even if opening data always destroyed any source of income for the public office that used to create and maintain them, this problem would only exist for the PSI datasets that are already sold today. Such data, even if of strategic importance as is the case with digital cartography, are only a minimal fraction of all the PSI that could and should be opened to increase transparency, reduce the costs of Government and stimulate the economy. In all these other cases:\n· the money to generate the data already arrives by some other source than sales and licensing(but even with those data it may be possible to generate them by crowdsourcing, thereby reducing those costs!)\n· the only extra expense caused by publishing those data online (assuming they're already available in some digital format, of course!), would be the hosting and bandwidth costs, that may be greatly reduced by mirroring and other technical solutions like torrents, already widely used to distribute Free/Open Source Software (FOSS) through the Internet.", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "4.4. Impose proper licensing and streamline procurement\nAs with the first report prepared for this project, we will not delve into the details of how to license data because this topic continues to be followed and debated in all details by LAPSI and other projects or researchers. We will simply confirm the importance of establishing a proper license, at the national level, for all Public Data, that makes them Open in the right way and makes sure that what is opened stays open and that don't demand what isn't possible to enforce (e.g. attribution), because, quoting again Eaves, \"no government should waste precious resources by paying someone to scour the Internet to find websites and apps that don't attribute\" .\nWe want, however, to spend a few words about another legal/administrative side of the issue, that is procurement. Traditional procurement laws are very likely not flexible enough, in most countries, to handle the implementation of data-based public services. Here's why.\nWe know that if Public Data are Open, everybody, from volunteer activists to hired professionals, can very quickly write or maintain simple software applications that help to visualize and use them in all possible ways. Paradoxically, this is a problem when an Administration either wants to set up an Open Data programming contest (that besides being inexpensive, it's much simpler to organize and join than traditional tenders or grants) or needs to just pay somebody to write from scratch and maintain some new program of this type, or customize existing ones.\nThe reason is that, just because this type of software development is so quick, even hiring a professional to do it, or setting up a contest would be... too inexpensive to be handled with default procurement procedures. Quoting from Day Two: Follow the Data, Iterating and the $1200 problem:", - "page_start": 28, - "page_end": 28, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "3.8. Need to better define what is Public Data\nTogether with citizens education, there is a huge challenge that Governments and the Open Data movement will have to face (hopefully together) in 2011 and beyond. This challenge is to update and expand the definition of Public Data and to have it accepted by lawmakers and public administrators.\n23/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nWhat is, exactly, Public Data? A definition that is accepted almost implicitly is \"data that is of public interest, that belongs to the whole community, data that every citizen is surely entitled to know and use\" . This definition is so generic that accepting it together with the assumption that all such data should be open as preached by the Open Data movement (online, as soon as possible, in machine readable format with an open license etc...) doesn't create any particular problem or conflict.\nReal problems however start as it has happened all too often so far, whenever we assume more or less consciously that \"Public Data\" in the sense defined above and data directly produced by Governments and Public Administrations, that is what's normally called PSI (Public Sector Information) are the same thing.\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public Data. But this is an age of privatization of many public services, from transportation to healthcare, energy and water management. This is an age in which many activities with potentially very serious impacts on whole communities, like processing of hazardous substances or toxic waste, happen outside Public Administrations. The paradox is that, as Sasaki put it, this increased privatization is happening in the very same period in which \" we are observing a worldwide diffusion of access to information laws that empower citizens to hold government agencies accountable.\"\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what constitutes traditional, official PSI. \"Public Data\" includes all that information plus the much bigger amount of data describing and measuring all the activities of private companies, from bus timetables to packaged food ingredients, aqueducts performances and composition of fumes released in the atmosphere, that have a direct impact on the health and rights of all citizens of the communities affected by the activities of those companies.", - "page_start": 22, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "3.7. The privacy problem\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air pollution measurements....)\n2. The majority of data that are directly related to individuals (e.g. things like names and address of people with specific diseases, or who were victims of some crime) have no reason to be published, nor there is any actual demand for them by Open Data advocates\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to public offices, Government and Parliament members etc...) already exist in many countries\n4. Very often, in practice, Open Data struggles only happen about when and how to make available in the most effective way for society information that was already recognized as public. What to declare public, hence open, is indeed a serious issue (more on this in the next paragraph) but is a separate one.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "2.2. Data Openness in EU\nBoth the interest and the need for data openness at the European Union level remain high. Here, without making any complete analysis, we'll only report and comment a few relevant episodes. While studies continue to point at the political and economical advantages of Open Data, great inefficiencies and delays still keep the time and cost savings that could be achieved a far goal for the European Union.\nAll the principles of the Open Declaration (collaboration, transparency, empowerment) have been declared key areas of action of the new EC eGov action plan. Particularly important, as explained\n6/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nby David Osimo in EU eGov action plan published: the good, the bad and the unknown, are the actions on Open Data (a EU portal and a revision of the EU PSI directive), and on citizens control over their data. However the Action Plan contains no reference to the need for a more open and collaborative governance.\nIn the case of European Structural Funds, as Luigi Reggi reported in March 2011:\nthere is no single point of access to the data. Hundreds of Managing Authorities are following different paths and implementing different information strategies when opening up their data.\nMany databases (often simple PDF lists) [...show...] huge variation not only in the way they can be accessed but also in content and quality of data provided.\n... [...The results of...] an independent web-based survey on the overall quality of data published by each Managing Authority responsible for the 434 Operational Programmes approved in July 2009... can be summarized as follows:\nThe use of open, machine-processable and linked-data formats have unexpected advantages in terms of transparency and re-use of the data by the public and private sector. The application of these technical principles does not need extra budget or major changes in government organization and information management; nor does it require the update of existing software and infrastructures. What is needed today is the promotion among national and local authorities of the culture of transparency and the raising of awareness of the benefits that could derive from opening up existing data and information in a re-usable way.", - "page_start": 5, - "page_end": 6, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "procurement.\nThe same issue is denounced as an obstacle to innovation and cost savings in New recommendations for improving local open government and creating online hubs:\nJohn Grant focused on a major pain point for government at all levels for tapping into the innovation economy: procurement issues, which civic entrepreneurs run into in cities, statehouses and Washington. \"It is time to look at these procurement rules more closely,\" he said, and promote higher levels of innovation. \"There are a lot of ideas are happening but a lot of rules restrict vendors from interacting in government,\" said Grant. Turner-Lee observed that traditional procurement laws may also not be flexible enough to bring more mobile apps into government.\nCurrent procurement laws aren't partially incompatible with an Open Data world only at this level, that is when it's time to procure software that makes the data useful. Even bigger problems and inefficiencies can be introduced at the beginning of data life, that is when data collection and processing services are procured. We've already explained that forgetting to impose the right license is one of the problems, but it's not the only one. Even future organization of all the foreseeable data management activities should take advantage of the flexibility provided by data openness. Here is how Tim Davies summarizes this point:\nRight now [public] bodies often procure data collection, data publishing and data interfaces all in one block (as seems to be the case with Oxfordshires real-time bus information - leading to a roadblock on innovation) - and so without these layers being separated in procurement, some of the benefits here stand to be lost.\nChanging procurement of information/data-rich public services would be, of course, only the first step of a general reform of procurement laws and regulations. After management of Open Data has been simplified, it becomes time to implement similar simplifications to procurement of everything else. In fact, in such a scenario, there would be much less possibilities for the loopholes, frauds and inefficiencies that forced local procurement procedures to become so slow and complicated: since the public budget and other relevant public data would already be fully open, errors and other problems would surface and be fixed much more quickly and reliably than today, even assuming that they would continue to appear with the same frequency.", - "page_start": 29, - "page_end": 29, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "How did serum estradiol and progesterone levels change during pregnancy?", - "target_page": 2, - "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Serological evaluations\nSerological evaluations captured canonical hormone fluctuations characteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum (preconception, estradiol (E) = 3.42 pg ml -1 and progesterone (P) = 0.84 ng ml -1 ; 3 weeks preparturition, E = 12,400 pg ml -1 and P = 103 ng ml -1 ; 3 months postparturition, E = 11.50 pg ml -1 and P = 0.04 ng ml -1 ).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Neuroanatomical changes observed over the course of a human pregnancy\nWorldwide, nearly 85% of women experience one or more pregnancies in their lifetime 1 , with 140 million women becoming pregnant each year. Over an approximately 40-week gestational window, the maternal body undergoes profound physiological adaptations to support the development of the fetus, including increases in plasma volume, metabolic rate, oxygen consumption and immune regulation 2 . These rapid adaptations are initiated by 100-fold to 1,000-fold increases in hormone production, including estrogen and progesterone. These neuromodulatory hormones also drive significant reorganization of the central nervous system. Evidence from animal models and human studies converge on pregnancy as a period of remarkable neuroplasticity 3-10 (see ref. 10 for one of the earliest known observations). Gestational increases in steroid hormone synthesis drive neurogenesis, dendritic spine growth, microglial proliferation, myelination and astrocyte remodeling (for review, see ref. 11). These cellular changes are pronounced in brain circuits that promote maternal behavior. For example, Ammari et al. recently discovered that steroid hormones can fine-tune the response properties of galanin neurons in the rodent medial preoptic area of the hypothalamus (mPOA), leading to enhanced sensitivity in dams to sensory cues from newborn pups 12 .\nIn humans, reductions in gray matter volume (GMV) have been observed postpartum 13-16 , particularly in regions central to theory-of-mind processing 13 . These GMV changes persist at 6 years postpartum 17 and are traceable decades later 18,19 , underscoring the permanence of this major remodeling event. And yet the changes that occur within the maternal brain during gestation itself are virtually unknown (see ref. 20 for early neuroimaging insight). A recent study by Paternina-Die et al. offers intriguing clues 21 . Women were scanned once in the third trimester and again in the postpartum period, revealing a reduction of cortical volume observable in the late pregnancy scan. These findings suggest that pregnancy is a highly dynamic period for neural remodeling, yet neuroscientists lack a detailed map of how the human brain changes throughout the gestational period.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed4.pdf" - }, - { - "text": "Endocrine procedures\nThe participant underwent a blood draw ( n = 19; Fig. 1c) before MRI scanning. Sex steroid concentrations were determined via ultra-sensitive liquid chromatography-mass spectrometry at the Brigham and Women's Hospital Research Assay Core (BRAC). Assay sensitivities, dynamic range and intra-assay coefficients of variation\nNature Neuroscience\nwere as follows: estradiol-1.0 pg ml -1 , 1-500 pg ml -1 , <5% relative s.d. (RSD); progesterone-0.05 ng ml -1 , 0.05-10 ng ml -1 , 9.33% RSD. Serological samples were not acquired in five sessions due to scheduling conflicts with UC Irvine's Center for Clinical Research.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "Comparing brain changes across pregnancy against controls\ncolors denote pregnancy stage. The participant underwent IVF to achieve pregnancy, allowing for precise mapping of ovulation, conception and gestation week. d , Summary (that is, total) of brain measures throughout the experiment. Generalized additive models revealed GMV, CT and total brain volume decreased throughout pregnancy (see Methods for validation with cubic regression), with a slight recovery postpartum. Global QA, lateral ventricle and CSF volumes displayed nonlinear increases across gestation, with a notable rise in the second and third trimesters before dropping sharply postpartum. Shaded regions represent 95% confidence bands; solid lines indicate model fit; dashed line indicates parturition.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" - }, - { - "text": "Endocrine procedures\nCortical GMV and CT . We then narrowed our analyses to the first 19 sessions (baseline-36 weeks gestation) to assess novel brain changes occurring over the gestational window. We first computed Pearson's product-moment correlation matrices between the following variables: gestation week, estradiol, progesterone and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then ran the analyses again to include total GMV in the regression model (Supplementary Table 2). This was extended to the network level, where we ran partial correlations accounting for total GMV. These same analyses were then run with CT measures. Globally-corrected results provided in Supplementary Tables 1-5. Percent change at the network level was computed by subtracting the final pregnancy value (36 weeks pregnant) from the first prepregnancy baseline value, then dividing that difference by said first prepregnancy baseline value. All analyses underwent multiple comparisons testing (false discovery rate (FDR)-corrected at q < 0.05).\nNature Neuroscience\nSubcortical GMV . A similar statistical approach was taken for subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by gestation week (FDR-corrected at q < 0.05).\nTo evaluate the relationship between gestation week and MTL subregion volume over pregnancy ( n = 7 bilateral subregions and n = 18 MTL scans), we used a combination of linear and nonlinear models based on individual subregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described in 'Summary brain metrics'). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for CA1 and CA2/CA3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of total GMV calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones (estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if they met FDR correction at q < 0.05.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "Participant\nOur participant (E.R.C.) was a healthy 38-year-old primiparous woman who underwent in-vitro fertilization (IVF) to achieve pregnancy. Previous studies reported no observable differences in neural changes from prepregnancy to postpregnancy between women who conceived naturally versus women who conceived via IVF 13 , and doing so provides a controlled way of monitoring pregnancy status. The participant experienced no pregnancy complications (for example, gestational diabetes and hypertension), delivered at full term via vaginal birth, nursed through 16 months postpartum, and had no history of neuropsychiatric diagnosis, endocrine disorders, prior head trauma or history of smoking. The participant gave written informed consent and the study was approved by the University of California, Irvine Human Subjects Committee.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "Supplement 1.\nTable 1. Types of Data Included From the Emergency Department (ED) Patient Electronic Health Record a\nDescriptive, Description = Date of birth, medical record number, encounter number, and total time of stay in ED. Encounter, Description = ED arrival date and time, IP admit date and time. Laboratory tests (all results available), Description = Examples: hemoglobin, hematocrit, white blood cell count, neutrophil count, platelets, sodium, potassium, chloride, bicarbonate, creatinine, blood urea nitrogen, troponin, D dimer, lactate, urinalysis, ketone, blood, nitrite, leucocytes, and red blood cells. Laboratory tests (only if abnormal), Description = Examples: β-human chorionic gonadotropin hormone, all serum drug levels (alcohol level, salicylate level, Tylenol level), magnesium, lipase, and erythrocyte sedimentation rate. Notes (in order of hierarchy), Description = EM clinician notes, consultation notes, EM progress notes, and EM procedure notes. Vitals, Description = Height, weight, temperature, heart rate, blood pressure, and peripheral capillary oxygen saturation. Orders, Description = Medications, consults, and radiology results", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "Comparing brain changes across pregnancy against controls\nWe then compared the changes in GMV across gestation to that of typical variability over time, derived from eight densely-sampled controls 23 . The GMV changes we see across pregnancy far exceed normative brain variability (Supplementary Fig. 11). On average, change in cortical GMV was nearly three times higher than controls scanned over a similar duration (Supplementary Fig. 11a,b). This extends to MTL subfields, wherein change in volume was three to four times greater across gestation than normative brain variability (Supplementary Fig. 11c,d). We contextualized these findings further by comparing gestational GMV change against our participant's preconception brain volumes; average GMV change during pregnancy was six times (cortical) and three times (MTL) higher than the variability observed between baseline sessions.\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0\nFig. 1 | Precision imaging reveals neuroanatomical changes throughout gestation. a , Standard medical demarcations for pregnancy stages (that is, trimesters) by gestation week (the image is created with BioRender.com). b , Steroid hormones increased significantly throughout pregnancy and dropped precipitously postpartum, as is characteristic of the prenatal and postnatal periods. c , A healthy 38-year-old primiparous woman underwent 26 scanning sessions from 3 weeks preconception through 2 years postpartum. Scans were distributed throughout preconception (four scans), first trimester (four scans), second trimester (six scans), third trimester (five scans) and postpartum (seven scans); tick marks indicate when major measures were collected and", - "page_start": 1, - "page_end": 2, - "source_file": "pubmed4.pdf" - }, - { - "text": "Gray Matter Volume & Cortical Thickness:\nWe first computed Pearson's product-moment correlation matrices between the following variables (n = 19 pregnancy scans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of noninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week (FDR-corrected at q < 0.05).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\noverlook the full range of changes that unfold within the gestational window, and underrepresent the brain's metamorphosis during pregnancy. Furthermore, although observed changes were largely global, some regions displayed notable stability (for example, extrastriate cortex). The subcortical region that displayed the strongest relationship with gestation week was the ventral diencephalon, which encompasses the hypothalamus and subsequent medial preoptic area and paraventricular nucleus-structures critical for inducing maternal behavior 12,16 . The hippocampus exhibited a reduction in volume across gestation, and with higher spatial resolution, this reduction was revealed to be driven by changes in CA1 and CA2/CA3 subfield volumes, while other hippocampal subfields remained stable. Adjacent PHC within the MTL also exhibited volume reduction across gestation. While our hippocampal findings are consistent with pre/post studies of pregnancy 13 , the precision lens applied within gestation revealed the nonlinear nature of this reduction. Recapitulating and clarifying these regionally specific patterns of volume change throughout the MTL merits further investigation.\nSimilar precision imaging studies have captured dynamic brain reorganization across other neuroendocrine transitions, such as the menstrual cycle (see review in ref. 28), underscoring the powerful role steroid hormones have in shaping the mammalian brain 29 . Endocrine changes across pregnancy dwarf those that occur across the menstrual cycle, which highlights the critical need to map the brain's response to this unique hormonal state. Broad physiological changes occur in tandem with the rise in steroid hormones, including changes in body mass composition, water retention, immune function and\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2258", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "Which cortical sub-networks were particularly sensitive to pregnancy?", - "target_page": 2, - "target_passage": "Several sensory and attention subnetworks were particu- larly sensitive to gestation, including the control (subnetwork B), sali- ence ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Cortical volume and thickness changes tied to gestation\nWe then narrowed the aperture to capture changes unfolding within gestation itself (baseline-36 weeks pregnant, 19 scans). Relationships between summary brain metrics were evident over the gestational period as follows: total brain volume, GMV and CT were positively associated with one another, whereas lateral ventricles, CSF and global QA demonstrated negative relationships with GMV (Supplementary Fig. 1).\nChanges in GMV were near-ubiquitous across the cortical mantle (Fig. 2a). Most large-scale brain networks exhibited decreases in GMV (Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of interest (ROI) demonstrated negative relationships between GMV and gestation week (Fig. 2a and Supplementary Table 2). Together, these results provide evidence of a global decrease in cortical volume across pregnancy. Several sensory and attention subnetworks were particularly sensitive to gestation, including the control (subnetwork B), salience/ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks (Supplementary Table 1). Regions driving these network-level changes include the bilateral inferior parietal lobe, postcentral gyri, insulae, prefrontal cortex, posterior cingulate and somatosensory cortex (Fig. 2c, Supplementary Table 2 and validation of findings using alternate pipeline in Supplementary Tables 1 and 3). These regions and\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2254\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Neuroanatomical changes observed over the course of a human pregnancy\nWorldwide, nearly 85% of women experience one or more pregnancies in their lifetime 1 , with 140 million women becoming pregnant each year. Over an approximately 40-week gestational window, the maternal body undergoes profound physiological adaptations to support the development of the fetus, including increases in plasma volume, metabolic rate, oxygen consumption and immune regulation 2 . These rapid adaptations are initiated by 100-fold to 1,000-fold increases in hormone production, including estrogen and progesterone. These neuromodulatory hormones also drive significant reorganization of the central nervous system. Evidence from animal models and human studies converge on pregnancy as a period of remarkable neuroplasticity 3-10 (see ref. 10 for one of the earliest known observations). Gestational increases in steroid hormone synthesis drive neurogenesis, dendritic spine growth, microglial proliferation, myelination and astrocyte remodeling (for review, see ref. 11). These cellular changes are pronounced in brain circuits that promote maternal behavior. For example, Ammari et al. recently discovered that steroid hormones can fine-tune the response properties of galanin neurons in the rodent medial preoptic area of the hypothalamus (mPOA), leading to enhanced sensitivity in dams to sensory cues from newborn pups 12 .\nIn humans, reductions in gray matter volume (GMV) have been observed postpartum 13-16 , particularly in regions central to theory-of-mind processing 13 . These GMV changes persist at 6 years postpartum 17 and are traceable decades later 18,19 , underscoring the permanence of this major remodeling event. And yet the changes that occur within the maternal brain during gestation itself are virtually unknown (see ref. 20 for early neuroimaging insight). A recent study by Paternina-Die et al. offers intriguing clues 21 . Women were scanned once in the third trimester and again in the postpartum period, revealing a reduction of cortical volume observable in the late pregnancy scan. These findings suggest that pregnancy is a highly dynamic period for neural remodeling, yet neuroscientists lack a detailed map of how the human brain changes throughout the gestational period.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\noverlook the full range of changes that unfold within the gestational window, and underrepresent the brain's metamorphosis during pregnancy. Furthermore, although observed changes were largely global, some regions displayed notable stability (for example, extrastriate cortex). The subcortical region that displayed the strongest relationship with gestation week was the ventral diencephalon, which encompasses the hypothalamus and subsequent medial preoptic area and paraventricular nucleus-structures critical for inducing maternal behavior 12,16 . The hippocampus exhibited a reduction in volume across gestation, and with higher spatial resolution, this reduction was revealed to be driven by changes in CA1 and CA2/CA3 subfield volumes, while other hippocampal subfields remained stable. Adjacent PHC within the MTL also exhibited volume reduction across gestation. While our hippocampal findings are consistent with pre/post studies of pregnancy 13 , the precision lens applied within gestation revealed the nonlinear nature of this reduction. Recapitulating and clarifying these regionally specific patterns of volume change throughout the MTL merits further investigation.\nSimilar precision imaging studies have captured dynamic brain reorganization across other neuroendocrine transitions, such as the menstrual cycle (see review in ref. 28), underscoring the powerful role steroid hormones have in shaping the mammalian brain 29 . Endocrine changes across pregnancy dwarf those that occur across the menstrual cycle, which highlights the critical need to map the brain's response to this unique hormonal state. Broad physiological changes occur in tandem with the rise in steroid hormones, including changes in body mass composition, water retention, immune function and\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2258", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "Neuroanatomical changes observed over the course of a human pregnancy\nHere we conducted a precision imaging study of pregnancy in which a healthy 38-year-old primiparous woman underwent 26 magnetic resonance imaging (MRI) scans and venipuncture beginning 3 weeks preconception through 2 years postpartum. We observed widespread reductions in cortical GMV and cortical thickness (CT) occurring in step with advancing gestational week and the dramatic rise in sex hormone production. Remodeling was also evident within\n1 Department of Psychological & Brain Sciences, University of California, Santa Barbara, CA, USA. 2 Department of Neurobiology and Behavior, University of California, Irvine, CA, USA. 3 Section on Functional Imaging Methods, Laboratory of Brain and Cognition, National Institute of Mental Health, National Institutes of Health, Bethesda, MD, USA. 4 Neuroscience Research Institute, University of California, Santa Barbara, CA, USA. 5 These authors contributed equally: Elizabeth R. Chrastil, Emily G. Jacobs. e-mail: laura.pritschet@pennmedicine.upenn.edu; chrastil@uci.edu; emily.jacobs@psych.ucsb.edu\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2253\nResource\nsubcortical structures, including the ventral diencephalon, caudate, thalamus, putamen and hippocampus. High-resolution imaging and segmentation of the medial temporal lobe (MTL) extend these findings further, revealing specific volumetric reductions within hippocampal subfields CA1, CA2/CA3 and parahippocampal cortex (PHC). In contrast to widespread decreases in cortical and subcortical GMV, correlational tractography analyses revealed nonlinear increases in white matter quantitative anisotropy (QA) throughout the brain-indicating greater tract integrity-as gestational week progressed. Together, these findings reveal the highly dynamic changes that unfold in a human brain across pregnancy, demonstrating a capacity for extensive neural remodeling well into adulthood.", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nAlthough studied to a lesser degree, ties between maternal behavior and white matter microstructure (particularly connectivity between temporal and occipital lobes) have been noted 31 . Here we reveal pronounced GMV changes in regions within sensory, attention and default mode networks over the gestational window. In parallel, we observed increased anisotropy in white matter tracts that facilitate communication between emotional and visual processing hubs 37-39 , including the inferior longitudinal fasciculus and inferior fronto-occipital fasciculus. Pinpointing the synchrony of gray and white matter changes that unfold in the maternal brain could be key to understanding the behavioral adaptions that emerge during and after pregnancy, such as honing the brain's visual and auditory responses to infant cues and eliciting maternal behavior. Research into other major transition periods supports this idea. For instance, adolescence is a dynamic period characterized by region-specific, nonlinear decreases in GMV and increases in WMV, maturational brain changes that are tied to gains in executive function and social cognition 40 . For both adolescence 41 and matrescence, the considerable rise in steroid hormone production appears to remodel the brain (see ref. 25 for comparative analysis), promoting a suite of behaviors adaptive to that life stage. How specific neural changes give rise to specific behavioral adaptations has yet to be fully explored with respect to human pregnancy.\nThis precision imaging study mapped neuroanatomical changes across pregnancy in a single individual, precluding our ability to generalize to the broader population. To benchmark our findings, we compared the magnitude of GMV changes observed throughout pregnancy against data from nonpregnant individuals sampled over a similar time course. Doing so provided compelling evidence that pregnancy-related neuroanatomical shifts far exceed normative day-to-day brain variability and measurement error. Evidence suggests that white matter microstructure remains fairly stable over a six-month period 42 , but more studies are needed to compare the degree of white matter changes observed during pregnancy to normative change over time. Further, sampling larger cohorts of women will generate much-needed normative models of brain change (akin to ref. 43) throughout pregnancy to establish what constitutes a typical degree of neuroanatomical change expected during gestation and postpartum recovery.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nOur findings from this precision imaging study show that pregnancy is characterized by reductions in GMV, cortical thinning and enhanced white matter microstructural integrity that unfold week by week. These changes were also tied to the significant rise in steroid hormone concentrations over pregnancy. Some of these changes persist at 2 years postpartum (for example, global reductions in GMV and CT), while others, including markers of white matter integrity, appear to be transient. Ventricular expansion and contraction parallel these cortical changes. These widespread patterns, and the notable increase in CSF volume across gestation, could reflect increased water retention and subsequent compression of cortical tissue. However, the persistence of these changes at 2 years postpartum and regional variation in GMV, CT and QA, hint at cellular underpinnings, such as alterations in glia\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2257\nor neuron number, synaptic density and myelination (for review on the latter, see ref. 4). Future studies of the relationship between fluid dynamics and volumetric changes will help clarify the factors that drive global neural changes during pregnancy; such insights will have broad implications for maternal health (for example, neurological effects tied to pre-eclampsia or edema).\nCritically, dynamic neural changes occurred within the pregnancy window itself, a nuance not captured by studies limited to comparisons between prepregnancy and postpregnancy. For example, we observed large increases in white matter microstructural integrity (QA) throughout the first and second trimesters of pregnancy, but these measures fully returned to baseline values by the first postpartum scan. This pattern may explain why previous studies report no pregnancy-related differences in white matter tractography 14 . Other measures, such as GMV and CT, decreased throughout gestation and displayed only a modest rebound postpartum. These nonlinear patterns suggest that only quantifying prepregnancy and postpartum brain structure may\nhttps://doi.org/10.1038/s41593-024-01741-0\nPHC\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nFigure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) sensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with temporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and Ballard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are reciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, the pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on units encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in cortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need to map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower and intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for exteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks that process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. (2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their putative neuronal underpinnings. See online article for colored version of this figure.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nsleep patterns 11 . These factors could have a role in the brain changes observed here, with some driving neurobiological changes and others, like water retention, potentially affecting MRI-based measurements. Note that, although cortical reductions in GMV over gestation were stable across analyses, accounting for QC measures influenced the magnitude and location of these results. These metrics all fell within the standard range, but there may be meaningful reductions in signal that accompany volumetric reductions (for example, increased CSF and decreased GM)-a methodological nuance that goes beyond the scope of this resource study. Ultimately, identifying the shared and unique contributions of these factors to the neuroanatomical changes that unfold across gestation warrants further investigation. Deeply phenotyping a large and diverse cohort of women across pregnancy will open up new avenues of exploration, for example, allowing researchers to link blood-based proteomic signatures to pregnancy outcomes; deploying wearable devices to monitor changes in sleep, cognition and mood; and probing the broader social and environmental determinants of maternal health 27 .\nThe neuroanatomical changes that unfold during matrescence may have broad implications for understanding individual differences in parental behavior 13,24,30,31 , vulnerability to mental health disorders 32,33 and patterns of brain aging 18,19,34-36 . Decreases in GMV may reflect 'fine-tuning' of the brain by neuromodulatory hormones in preparation for parenthood 26 . For example, in rodents, steroid hormones promote parental behavior by remodeling specific neural circuits in the medial preoptic area of the hypothalamus. These behavioral adaptations are critical to the dam's ability to meet the demands of caring for\nResource\nthe offspring 12 . Human studies have revealed GMV reductions in areas of the brain important for social cognition and the magnitude of these changes corresponds with increased parental attachment 13 . Deeper examination of cellular and systems-level mechanisms will improve our understanding of how pregnancy remodels specific circuits to promote maternal behavior.", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "Cortical volume and thickness changes tied to gestation\nassociated brain networks appear to decrease in volume at a faster rate than the rest of the brain throughout pregnancy, as determined by a subsequent analysis controlling for total GMV (Supplementary Tables 1 and 2). GMV reductions were also significantly correlated with the participant's estradiol and progesterone concentrations (Supplementary Table 1). A highly similar pattern of results was observed when examining pregnancy-related CT changes (Supplementary Fig. 3 and Supplementary Tables 4 and 5). Significant reductions in cortical GMV over gestation remained after controlling for standard quality control (QC) metrics, albeit with some influence on the magnitude and location of the observed effects (Supplementary Figs. 4 and 5).\nIn contrast, GMV within regions of the default mode (subnetwork C), limbic (subnetworks A and B) and visual peripheral networks buck the global trend by slightly increasing (for example, temporal poles), remaining constant (for example, orbitofrontal cortex) or reducing at a much slower rate (for example, extrastriate cortex) than total GMV (Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these regions exhibit similar patterns (Supplementary Fig. 3 and Supplementary Tables 4 and 5).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nb\nCA1\nMedial temporal lobe subregion volumes\nCA2/CA3\nFig. 3 | Subcortical GMV changed throughout gestation. a , Multivariate regression analyses revealed largely negative relationships between gestation week and subcortical GMV regions over pregnancy, including bilateral thalamus, caudate, hippocampus, ventral diencephalon (encompassing hypothalamus, substantia nigra, mammillary body and red nucleus) and left caudate. Lateral ventricles displayed the only positive relationships with gestation week (also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown here were derived via FreeSurfer and 'aseg' subcortical segmentation. FDRcorrected at q < 0.05. Inset, right ventral diencephalon displayed the strongest negative association with gestation (left; baseline-36 weeks, 19 scans) and did not return to baseline postpartum (right; gestation and postpartum, 26 scans). b , The participant's hippocampus and surrounding cortex were segmented\ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression analyses (PHC) revealed subfields were negatively associated with gestation week (baseline-36 weeks, 18 scans) and did not return to baseline postpartum (gestation and postpartum, 25 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each boxplot represents IQR for each stage, with a horizontal line representing the median value. The whiskers indicate variability outside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either end of the box. FDR-corrected at q < 0.05. For a and b , nonsignificant regions were set to zero for interpretability. See Supplementary Fig. 6 for complete labeling of regions in both segmentations. Brain visualizations created with R package ggseg 48 . DC, diencephalon.\noutstanding questions. This study and corresponding open-access dataset offer neuroscientists a detailed map of the human brain across gestation, a resource for which a wide range of previously unattainable neurobiological questions can now be explored.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "What may reflect the decrease in GMV during pregnancy?", - "target_page": 6, - "target_passage": " Decreases in GMV may reflect ‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- tion for parenthood", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Gray Matter Volume & Cortical Thickness:\nWe first computed Pearson's product-moment correlation matrices between the following variables (n = 19 pregnancy scans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of noninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week (FDR-corrected at q < 0.05).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "Discussion\nConverging evidence across mammalian species points to pregnancy as a remarkable period of neuroplasticity, revealing the brain's ability to undergo adaptive, hormonally-driven neuroanatomical changes beyond adolescence 13-15,20,21,24-26 . Investigations that compare women\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2255\nprepregnancy and then again postpartum provide the strongest evidence to date that the human brain undergoes such neural changes 11,27 . But what about pregnancy itself? Over what time course do anatomical changes in the maternal brain manifest? Are they tied to the substantial increase in sex hormone production? Here we begin to address these\nResource\na\nWhole-brain GMV\nGMV ~ gestation week\nFig. 2 | Cortical GMV showed widespread change through gestation and\nhttps://doi.org/10.1038/s41593-024-01741-0\nPostcentral gyrus Dorsal attention network B Regional GMV\nFrontal eye fields\nDorsal attention network B\nc\nPrecuneus/posterior cingulate Default mode network A\nMedial frontal Salience ventral attention network A\nInsula Salience ventral attention network B\npostpartum. a , Multivariate regression analyses reveal largely negative relationships between gestation week and regional GMV, with only a minority of regions unaffected or increasing over the gestational window (baseline-36 weeks). All associations presented here were corrected for multiple comparisons (FDR at q < 0.05; nonsignificant values set to zero for interpretability). b , Average network change was calculated by estimating GMV percent change from baseline (initial) to 36 weeks gestation (final). Attention and control networks appear most affected. c , Six representative regions, classified by major subnetworks, that exhibit pronounced GMV change across gestation. For each panel, we display a scatterplot between average GMV of the ROIs and gestation week (left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy stage across the whole study (right; gestation and postpartum sessions, 26 scans).", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nOur findings from this precision imaging study show that pregnancy is characterized by reductions in GMV, cortical thinning and enhanced white matter microstructural integrity that unfold week by week. These changes were also tied to the significant rise in steroid hormone concentrations over pregnancy. Some of these changes persist at 2 years postpartum (for example, global reductions in GMV and CT), while others, including markers of white matter integrity, appear to be transient. Ventricular expansion and contraction parallel these cortical changes. These widespread patterns, and the notable increase in CSF volume across gestation, could reflect increased water retention and subsequent compression of cortical tissue. However, the persistence of these changes at 2 years postpartum and regional variation in GMV, CT and QA, hint at cellular underpinnings, such as alterations in glia\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2257\nor neuron number, synaptic density and myelination (for review on the latter, see ref. 4). Future studies of the relationship between fluid dynamics and volumetric changes will help clarify the factors that drive global neural changes during pregnancy; such insights will have broad implications for maternal health (for example, neurological effects tied to pre-eclampsia or edema).\nCritically, dynamic neural changes occurred within the pregnancy window itself, a nuance not captured by studies limited to comparisons between prepregnancy and postpregnancy. For example, we observed large increases in white matter microstructural integrity (QA) throughout the first and second trimesters of pregnancy, but these measures fully returned to baseline values by the first postpartum scan. This pattern may explain why previous studies report no pregnancy-related differences in white matter tractography 14 . Other measures, such as GMV and CT, decreased throughout gestation and displayed only a modest rebound postpartum. These nonlinear patterns suggest that only quantifying prepregnancy and postpartum brain structure may\nhttps://doi.org/10.1038/s41593-024-01741-0\nPHC\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "Cortical volume and thickness changes tied to gestation\nassociated brain networks appear to decrease in volume at a faster rate than the rest of the brain throughout pregnancy, as determined by a subsequent analysis controlling for total GMV (Supplementary Tables 1 and 2). GMV reductions were also significantly correlated with the participant's estradiol and progesterone concentrations (Supplementary Table 1). A highly similar pattern of results was observed when examining pregnancy-related CT changes (Supplementary Fig. 3 and Supplementary Tables 4 and 5). Significant reductions in cortical GMV over gestation remained after controlling for standard quality control (QC) metrics, albeit with some influence on the magnitude and location of the observed effects (Supplementary Figs. 4 and 5).\nIn contrast, GMV within regions of the default mode (subnetwork C), limbic (subnetworks A and B) and visual peripheral networks buck the global trend by slightly increasing (for example, temporal poles), remaining constant (for example, orbitofrontal cortex) or reducing at a much slower rate (for example, extrastriate cortex) than total GMV (Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these regions exhibit similar patterns (Supplementary Fig. 3 and Supplementary Tables 4 and 5).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Endocrine procedures\nCortical GMV and CT . We then narrowed our analyses to the first 19 sessions (baseline-36 weeks gestation) to assess novel brain changes occurring over the gestational window. We first computed Pearson's product-moment correlation matrices between the following variables: gestation week, estradiol, progesterone and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then ran the analyses again to include total GMV in the regression model (Supplementary Table 2). This was extended to the network level, where we ran partial correlations accounting for total GMV. These same analyses were then run with CT measures. Globally-corrected results provided in Supplementary Tables 1-5. Percent change at the network level was computed by subtracting the final pregnancy value (36 weeks pregnant) from the first prepregnancy baseline value, then dividing that difference by said first prepregnancy baseline value. All analyses underwent multiple comparisons testing (false discovery rate (FDR)-corrected at q < 0.05).\nNature Neuroscience\nSubcortical GMV . A similar statistical approach was taken for subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by gestation week (FDR-corrected at q < 0.05).\nTo evaluate the relationship between gestation week and MTL subregion volume over pregnancy ( n = 7 bilateral subregions and n = 18 MTL scans), we used a combination of linear and nonlinear models based on individual subregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described in 'Summary brain metrics'). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for CA1 and CA2/CA3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of total GMV calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones (estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if they met FDR correction at q < 0.05.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "Comparing brain changes across pregnancy against controls\nWe then compared the changes in GMV across gestation to that of typical variability over time, derived from eight densely-sampled controls 23 . The GMV changes we see across pregnancy far exceed normative brain variability (Supplementary Fig. 11). On average, change in cortical GMV was nearly three times higher than controls scanned over a similar duration (Supplementary Fig. 11a,b). This extends to MTL subfields, wherein change in volume was three to four times greater across gestation than normative brain variability (Supplementary Fig. 11c,d). We contextualized these findings further by comparing gestational GMV change against our participant's preconception brain volumes; average GMV change during pregnancy was six times (cortical) and three times (MTL) higher than the variability observed between baseline sessions.\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0\nFig. 1 | Precision imaging reveals neuroanatomical changes throughout gestation. a , Standard medical demarcations for pregnancy stages (that is, trimesters) by gestation week (the image is created with BioRender.com). b , Steroid hormones increased significantly throughout pregnancy and dropped precipitously postpartum, as is characteristic of the prenatal and postnatal periods. c , A healthy 38-year-old primiparous woman underwent 26 scanning sessions from 3 weeks preconception through 2 years postpartum. Scans were distributed throughout preconception (four scans), first trimester (four scans), second trimester (six scans), third trimester (five scans) and postpartum (seven scans); tick marks indicate when major measures were collected and", - "page_start": 1, - "page_end": 2, - "source_file": "pubmed4.pdf" - }, - { - "text": "Comparing brain changes across pregnancy against controls\ncolors denote pregnancy stage. The participant underwent IVF to achieve pregnancy, allowing for precise mapping of ovulation, conception and gestation week. d , Summary (that is, total) of brain measures throughout the experiment. Generalized additive models revealed GMV, CT and total brain volume decreased throughout pregnancy (see Methods for validation with cubic regression), with a slight recovery postpartum. Global QA, lateral ventricle and CSF volumes displayed nonlinear increases across gestation, with a notable rise in the second and third trimesters before dropping sharply postpartum. Shaded regions represent 95% confidence bands; solid lines indicate model fit; dashed line indicates parturition.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes\nsleep patterns 11 . These factors could have a role in the brain changes observed here, with some driving neurobiological changes and others, like water retention, potentially affecting MRI-based measurements. Note that, although cortical reductions in GMV over gestation were stable across analyses, accounting for QC measures influenced the magnitude and location of these results. These metrics all fell within the standard range, but there may be meaningful reductions in signal that accompany volumetric reductions (for example, increased CSF and decreased GM)-a methodological nuance that goes beyond the scope of this resource study. Ultimately, identifying the shared and unique contributions of these factors to the neuroanatomical changes that unfold across gestation warrants further investigation. Deeply phenotyping a large and diverse cohort of women across pregnancy will open up new avenues of exploration, for example, allowing researchers to link blood-based proteomic signatures to pregnancy outcomes; deploying wearable devices to monitor changes in sleep, cognition and mood; and probing the broader social and environmental determinants of maternal health 27 .\nThe neuroanatomical changes that unfold during matrescence may have broad implications for understanding individual differences in parental behavior 13,24,30,31 , vulnerability to mental health disorders 32,33 and patterns of brain aging 18,19,34-36 . Decreases in GMV may reflect 'fine-tuning' of the brain by neuromodulatory hormones in preparation for parenthood 26 . For example, in rodents, steroid hormones promote parental behavior by remodeling specific neural circuits in the medial preoptic area of the hypothalamus. These behavioral adaptations are critical to the dam's ability to meet the demands of caring for\nResource\nthe offspring 12 . Human studies have revealed GMV reductions in areas of the brain important for social cognition and the magnitude of these changes corresponds with increased parental attachment 13 . Deeper examination of cellular and systems-level mechanisms will improve our understanding of how pregnancy remodels specific circuits to promote maternal behavior.", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "11.6.23 Remote Copy states and events\n/SM590000 Step 1:\na. The MM/GM relationship is created with the -sync option, and the MM/GM relationship enters the ConsistentStopped state.\nb. The MM/GM relationship is created without specifying that the master and auxiliary volumes are in sync, and the MM/GM relationship enters the InconsistentStopped state.\n/SM590000 Step 2:\na. When an MM/GM relationship is started in the ConsistentStopped state, the MM/GM relationship enters the ConsistentSynchronized state. Therefore, no updates (write I/O) were performed on the master volume while in the ConsistentStopped state. Otherwise, the -force option must be specified, and the MM/GM relationship then enters the InconsistentCopying state while the background copy is started.\nb. When an MM/GM relationship is started in the InconsistentStopped state, the MM/GM relationship enters the InconsistentCopying state while the background copy is started.\n/SM590000 Step 3:\nWhen the background copy completes, the MM/GM relationship changes from the InconsistentCopying state to the ConsistentSynchronized state.\n/SM590000 Step 4:\na. When a MM/GM relationship is stopped in the ConsistentSynchronized state, the MM/GM relationship enters the Idling state when you specify the -access option, which enables write I/O on the auxiliary volume.\nb. When an MM/GM relationship is stopped in the ConsistentSynchronized state without an -access parameter, the auxiliary volumes remain read-only and the state of the relationship changes to ConsistentStopped .\nc. To enable write I/O on the auxiliary volume, when the MM/GM relationship is in the ConsistentStopped state, issue the svctask stoprcrelationship command, which specifies the -access option, and the MM/GM relationship enters the Idling state.\n/SM590000 Step 5:\na. When an MM/GM relationship is started from the Idling state, you must specify the -primary argument to set the copy direction. If no write I/O was performed (to the master or auxiliary volume) while in the Idling state, the MM/GM relationship enters the ConsistentSynchronized state.", - "page_start": 555, - "page_end": 556, - "source_file": "sg247938.pdf" - }, - { - "text": "Neuroanatomical changes observed over the course of a human pregnancy\nWorldwide, nearly 85% of women experience one or more pregnancies in their lifetime 1 , with 140 million women becoming pregnant each year. Over an approximately 40-week gestational window, the maternal body undergoes profound physiological adaptations to support the development of the fetus, including increases in plasma volume, metabolic rate, oxygen consumption and immune regulation 2 . These rapid adaptations are initiated by 100-fold to 1,000-fold increases in hormone production, including estrogen and progesterone. These neuromodulatory hormones also drive significant reorganization of the central nervous system. Evidence from animal models and human studies converge on pregnancy as a period of remarkable neuroplasticity 3-10 (see ref. 10 for one of the earliest known observations). Gestational increases in steroid hormone synthesis drive neurogenesis, dendritic spine growth, microglial proliferation, myelination and astrocyte remodeling (for review, see ref. 11). These cellular changes are pronounced in brain circuits that promote maternal behavior. For example, Ammari et al. recently discovered that steroid hormones can fine-tune the response properties of galanin neurons in the rodent medial preoptic area of the hypothalamus (mPOA), leading to enhanced sensitivity in dams to sensory cues from newborn pups 12 .\nIn humans, reductions in gray matter volume (GMV) have been observed postpartum 13-16 , particularly in regions central to theory-of-mind processing 13 . These GMV changes persist at 6 years postpartum 17 and are traceable decades later 18,19 , underscoring the permanence of this major remodeling event. And yet the changes that occur within the maternal brain during gestation itself are virtually unknown (see ref. 20 for early neuroimaging insight). A recent study by Paternina-Die et al. offers intriguing clues 21 . Women were scanned once in the third trimester and again in the postpartum period, revealing a reduction of cortical volume observable in the late pregnancy scan. These findings suggest that pregnancy is a highly dynamic period for neural remodeling, yet neuroscientists lack a detailed map of how the human brain changes throughout the gestational period.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "How to light up my sports smart watch?", - "target_page": 2, - "target_passage": "Up button: Short press to light up or turn off the screen", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "3. Find Watch\nAfter the smartwatch is bound to the APP, you click 'Find Watch' in the APP, the smartwatch will light up and vibrate for once.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "Sports smart watch User Manual DT3 Mate\nThank you for choosing our smart watch. You can fully understand the use and operation of the equipment by reading this manual.\nThe company reserves the right to modify the contents of this manual without any prior notice.\nThe product contains: a packing box, a manual, a watch body, and a charging cable.", - "page_start": 0, - "page_end": 0, - "source_file": "6126797.pdf" - }, - { - "text": "Smart home automation\nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "6. Tilt to wake the screen\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you can light up the screen when you raise up your wrist.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "Up button:\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to reactivate the watch.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "Button down:\nShort press to enter multi-sport mode.\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any buttons.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "11.1.Push an existing watch face\nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart and bind the APP automatically after the synchronization of the watch face.\n11.2. Customize the watch face\nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch faces marked with 'custom watch faces' are customizable. The watch will restart and bind the APP automatically after the synchronization of the watch face.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "1.1 Shortcut function:\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the shortcut.\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth connection status, time, power, brightness adjustment and other functions.\n3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest message (enter to view multiple messages)/some of the recently used menu functions, and turn on or off audio Bluetooth for calls.\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and scroll up and down to find the corresponding function.\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select one of them and set it with one-click.", - "page_start": 1, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "1.3 Drop-down menu\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu interface.\n1) Bluetooth connection status; time; power left;\n2) About, where you can check the firmware version of watch and the address of the Bluetooth\n3) Setting, where you can enter it to set part of the functions;\n4) Brightness adjustment; where you can adjust the brightness of the screen;\n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize offline payment.", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "2.4 Weather\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the watch to display the weather information for the day.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "Is my sports smartwatch's fitness data turned on or off by default?", - "target_page": 4, - "target_passage": "Fitness data is turned on by default.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "1.7 Fitness data\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the screen, the smartwatch will display the current data of steps, distance, and calories. The data will be wiped out at 00:00 every day in the morning.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "3. Find Watch\nAfter the smartwatch is bound to the APP, you click 'Find Watch' in the APP, the smartwatch will light up and vibrate for once.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "5. Data synchronization\nAfter the watch is successfully bound to the application, the data in the smartwatch can be synchronized to the application.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "2.2 Connected to the APP state:\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will synchronized after the smartwatch is bound to the APP successfully.\n2.3 Binding the audio/calling Bluetooth\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and click it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of the audio/calling Bluetooth of the smartwatch to bind it.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "1.9 Heart rate\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the heart rate function. If you don't wear the smartwatch properly, it will remind you to wear firmly for the measurement.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "2.4 Weather\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the watch to display the weather information for the day.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "2.1 Remote control music\nBind the smartwatch to the app WearPro, you can control the music to start/pause/play previous song/play next song of your phone.\nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the smartwatch.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "basketball, football)\n1.8.1 Select the corresponding exercise mode, click the 'Start' button on the screen to start the exercise; click the 'Start' button again to pause the recording of the exercise; click the 'End' button to end the recording, and save to the data.\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the recording time is less than 1 minute, the smartwatch will remind you that the data is too little to be saved.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "1.10 ECG\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the ECG interface in the app, you can have single measurement at a time. The data of ECG will be saved in the mobile phone. This function should be used with the app.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "6. Tilt to wake the screen\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you can light up the screen when you raise up your wrist.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "When does my Sport smartwatch start and stop monitoring sleep?", - "target_page": 5, - "target_passage": "Sleep monitoring time period: from 18:00 at night to 10:00 the next day", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "2.2 Sleep\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be generated by the watch. After connecting to the APP, the sleep data on the watch can be synchronized to the APP for you to check.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "3. Find Watch\nAfter the smartwatch is bound to the APP, you click 'Find Watch' in the APP, the smartwatch will light up and vibrate for once.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "2.2 Connected to the APP state:\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will synchronized after the smartwatch is bound to the APP successfully.\n2.3 Binding the audio/calling Bluetooth\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and click it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of the audio/calling Bluetooth of the smartwatch to bind it.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "1.9 Heart rate\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the heart rate function. If you don't wear the smartwatch properly, it will remind you to wear firmly for the measurement.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "5. Data synchronization\nAfter the watch is successfully bound to the application, the data in the smartwatch can be synchronized to the application.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "2.1 Remote control music\nBind the smartwatch to the app WearPro, you can control the music to start/pause/play previous song/play next song of your phone.\nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the smartwatch.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "2.4 Weather\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the watch to display the weather information for the day.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "11.1.Push an existing watch face\nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart and bind the APP automatically after the synchronization of the watch face.\n11.2. Customize the watch face\nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch faces marked with 'custom watch faces' are customizable. The watch will restart and bind the APP automatically after the synchronization of the watch face.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "6. Tilt to wake the screen\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you can light up the screen when you raise up your wrist.", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "1.6 Frequently used contacts\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile phone, then you can synchronize you contacts of your mobile phone to the smartwatch.", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "Have the operating profits in Japan for Nissan gone up or down in 2004?", - "target_page": 5, - "target_passage": "operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Nissan\nNissan Annual Report 2004", - "page_start": 23, - "page_end": 23, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nshare*(%) = 41.87. Nissan Motor Car Carrier Co., Ltd., Location = Tokyo. Nissan Motor Car Carrier Co., Ltd., Principal business = International automobile transport. Nissan Motor Car Carrier Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥640. Nissan Motor Car Carrier Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 60.00. Nissan Trading Co., Ltd., Location = Yokohama, Kanagawa. Nissan Trading Co., Ltd., Principal business = Import and export of automobiles, parts, etc.. Nissan Trading Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥320. Nissan Trading Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Financial Services Co., Ltd., Location = Chiba, Chiba. Nissan Financial Services Co., Ltd., Principal business = Automobile financing and leasing. Nissan Financial Services Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥16,387. Nissan Financial Services Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Autech Japan, Inc., Location = Chigasaki, Kanagawa. Autech Japan, Inc., Principal business = Development, manufacture and sales of limited-edition automobiles. Autech Japan, Inc., As of Mar. 31, 2005.Capital (millions) = ¥480. Autech Japan, Inc., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Real Estate Development Corporation, Location = Tokyo. Nissan Real Estate Development Corporation, Principal business = Real estate sales, purchase and leasing. Nissan Real Estate Development Corporation, As of Mar. 31, 2005.Capital (millions) = ¥1,000. Nissan Real Estate Development Corporation, As of Mar. 31, 2005.Nissan share*(%) = 70.50. Nissan Finance Co., Ltd., Location = Tokyo. Nissan Finance Co., Ltd., Principal business = Finance and accounting support. Nissan Finance Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥2,491. Nissan Finance Co., Ltd., As of Mar. 31, 2005.Nissan", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Five-Year Share Performance\nNissan Annual Report 2004\n15\nPERFORMANCE\nWHO WE ARE\nNissan Annual Report 2004 16\nWHO WE ARE\nNISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS AND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS OPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT COMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL MACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE PRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR CUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\n17\nWHO WE ARE\nWHO WE ARE\n18", - "page_start": 16, - "page_end": 19, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nNissan Europe S.A.S., 1 = Trappes, France. Nissan Europe S.A.S., 2 = Management of European manufacturing and sales. Nissan Europe S.A.S., 3 = €1,626. Nissan Europe S.A.S., 4 = 100.00. Nissan International Finance (Netherlands) B.V., 1 = Amsterdam, The Netherlands. Nissan International Finance (Netherlands) B.V., 2 = Financing for group companies. Nissan International Finance (Netherlands) B.V., 3 = €13. Nissan International Finance (Netherlands) B.V., 4 = 100.00. Nissan France S.A., 1 = Trappes, France. Nissan France S.A., 2 = Sales of automobiles and parts. Nissan France S.A., 3 = €4. Nissan France S.A., 4 = 94.77. Nissan Motor (GB) Ltd., 1 = Rickmansworth, UK. Nissan Motor (GB) Ltd., 2 = Sales of automobiles and parts. Nissan Motor (GB) Ltd., 3 = £136. Nissan Motor (GB) Ltd., 4 = 100.00. Nissan Holding (UK) Ltd., 1 = Sunderland, UK. Nissan Holding (UK) Ltd., 2 = Holding company for English subsidiaries. Nissan Holding (UK) Ltd., 3 = €870. Nissan Holding (UK) Ltd., 4 = 100.00. Nissan Italia S.p.A., 1 = Rome, Italy. Nissan Italia S.p.A., 2 = Sales of automobiles and parts. Nissan Italia S.p.A., 3 = €5. Nissan Italia S.p.A., 4 = 100.00. Nissan Motor Manufacturing (UK) Ltd., 1 = Sunderland, UK. Nissan Motor Manufacturing (UK) Ltd., 2 = Manufacture and sales of automobiles and parts. Nissan Motor Manufacturing (UK) Ltd., 3 = £250. Nissan Motor Manufacturing (UK) Ltd., 4 = 100.00. Nissan Technical Center Europe Ltd., 1 = Granfield, UK. Nissan Technical Center Europe Ltd., 2 = Research and development, testing. Nissan Technical Center Europe Ltd., 3 = £15. Nissan Technical Center", - "page_start": 108, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nshare*(%) = 100.00. Aichi Nissan Motor Co., Ltd., Location = Nagoya, Aichi. Aichi Nissan Motor Co., Ltd., Principal business = Sales of automobiles and parts. Aichi Nissan Motor Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥100. Aichi Nissan Motor Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Tokyo Nissan Motor Sales Co., Ltd., Location = Tokyo. Tokyo Nissan Motor Sales Co., Ltd., Principal business = Sales of automobiles and parts. Tokyo Nissan Motor Sales Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥100. Tokyo Nissan Motor Sales Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Prince Tokyo Motor Sales Co., Ltd., Location = Tokyo. Nissan Prince Tokyo Motor Sales Co., Ltd., Principal business = Sales of automobiles and parts. Nissan Prince Tokyo Motor Sales Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥100. Nissan Prince Tokyo Motor Sales Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Chuo Parts Sales Co., Ltd., Location = Yokohama, Kanagawa. Nissan Chuo Parts Sales Co., Ltd., Principal business = Sales of automobile repair parts. Nissan Chuo Parts Sales Co., Ltd., As of Mar. 31, 2005.Capital (millions) = ¥545. Nissan Chuo Parts Sales Co., Ltd., As of Mar. 31, 2005.Nissan share*(%) = 80.61. US, Location = . US, Principal business = . US, As of Mar. 31, 2005.Capital (millions) = . US, As of Mar. 31, 2005.Nissan share*(%) = . Nissan North America, Inc., Location = Gardena, California. Nissan North America, Inc., Principal business = Management of North American subsidiaries, manufacture and sales of automobiles and parts. Nissan North America, Inc., As of Mar. 31, 2005.Capital (millions) = $1,791. Nissan North America, Inc., As of Mar. 31, 2005.Nissan", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "OUR WAY\nNissan Annual Report 2004", - "page_start": 19, - "page_end": 19, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "From the C Platform\nThe real importance of the Alliance lies in its potential. The two companies do not exist in separate worlds, but they do possess different cultures and strengths. Renault is strong in Europe, which is good for Nissan. Nissan is strong in Japan and North America, which is good for Renault. We can challenge each other, and in doing so, drive ourselves to greater heights.\nNissan Annual Report 2004\n31\nWHO WE ARE\nOUR WORK\n32\nNISSAN IS A WORLD-CLASS AUTOMOBILE MANUFACTURER. TO ENVISION, PLAN, BUILD AND DISTRIBUTE MILLIONS OF AUTOMOBILES TO THE WORLD REQUIRES A CLEAR DEFINITION OF ROLES AND PROCESSES. AT NISSAN, OUR BUSINESS DIVISIONS COMMUNICATE IDEAS ACROSS COUNTRIES, CULTURES AND FUNCTIONS TO DEVISE THE TRANSPARENT, EFFICIENT SOLUTIONS THAT CREATE SUCCESS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\nNissan Annual Report 2004\n33\nOUR WORK\nOUR WORK\n34\nPLANNING", - "page_start": 32, - "page_end": 35, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Economic Factors\nThe demand for products manufactured by Nissan is affected by the economic conditions in each country or market in which they are offered for sale. Nissan conducts its operations all over the world and, in particular, in the major markets of North America, Europe, and Asia, to say nothing of Japan. While Nissan strives to develop a comprehensive and integrated projection of the global economic outlook, any greater-than-anticipated downturn in one of these markets may have a significant effect on Nissan financial position and results of operations.", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Dynamism and Diversity\nWe also believe that women can contribute a great deal more to the growth of the Company. When this office started in October 2004, only 1.6 percent of all managers and 5.7 percent of the total workforce were women. By the end of NISSAN Value-Up, our target is to have 5 percent of qualified female managers. To accomplish this, we promote the career\nInstitute in Hakone. There are other training centers, but this is the first one focused primarily on leadership development. The trainees are a select group of people taken through programs designed to nurture Nissan's next generation of leaders.\nMy vision of our future is to create a global HR organization that would oversee the entire Nissan group, including our affiliated companies. Harmonizing our HR polices and procedures would help unite the various group companies, which in turn would leave little doubt that there is just one Nissan.\nHR is an integral part of what makes Nissan such a powerful organization. We're attempting to create a wellmotivated team, and provide good training for tomorrow's leaders. Look at all the changes that have occurred under strong leadership! If we can produce 20 or 30 leaders like Carlos Ghosn, just imagine what kind of company we could be.'\ndevelopment of women and hold workshops for all managers to instill a deeper understanding of the importance of diversity. We're also exploring the issue of balancing work and private life-an important topic in Japan to both women and men.\nA diversified workforce is essential to Nissan's success because the marketplace itself is so diversified. Addressing this makes us a more innovative company, and also delivers a tool for recruiting qualified people. We know this policy is being noticed, too: the Tokyo bureau of the Ministry of Health, Labour and Welfare recently recognized our\naccomplishments in promoting diversity, and\nother Japanese companies now use Nissan as\na benchmark.\nNissan Annual Report 2004\n57\nOUR WORK\nOUR WORLD\nNissan Annual Report 2004 58\nOUR WORLD\nNISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY AT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL AND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND THEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN. WITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\n59\nOUR WORLD\nOUR WORLD\n60", - "page_start": 58, - "page_end": 61, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Investor Relations Website\nhttp://www.nissan-global.com/EN/IR/\nNissan Annual Report 2004 110\nThis annual report is printed on recycled paper.\nNissan Annual Report 2004\nc3", - "page_start": 111, - "page_end": 112, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "How can CEDAR Oil be used with the AY11236 microscope?", - "target_page": 10, - "target_passage": "1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil. 2. After finishing the observation, wipe off the cedar oil. 3. Do not use the 40x objective until you have wiped off all of the cedar oil.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "USING THE CEDAR OIL\n1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil.\n2. After finishing the observation, wipe off the cedar oil.\n3. Do not use the 40x objective until you have wiped off all of the cedar oil.\n17", - "page_start": 9, - "page_end": 9, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MODEL AY11236\nModel AY11236", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11230 and Model AY11234 are trinocular microscopes designed for biological studies such as specimen examination. They can also be used for examining bacteria and for general clinical and medical studies. Simple design and use and the vertical tube make them is useful for school classroom instruction.", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11236 is a powerful fixed power compound microscope designed for biological studies such as specimen examination. It can also be used for examining bacteria and for general clinical and medical studies and other scientific uses.", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11240 and Model AY11238 are designed for biological studies such as specimen examination. They can also be used for examining bacteria and for general clinical and medical studies. Simple design and use is especially useful for school classroom instruction.", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11228 and Model AY11232 are designed for biological studies such as specimen examination. They can also be used for examining bacteria and for general clinical and medical studies. Simple design and use is especially useful for school classroom instruction.", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USER MANUAL\nMODEL AY11240 40X,100X,400X COMPOUND MONOCULAR\nMODEL AY11238 40X,100X,400X COMPOUND MONOCULAR\nMODEL AY11228 20X,40X STEREO BINOCULAR\nMODEL AY11232 7X-45X STEREO ZOOM\nMODEL AY11230 20X,40X STEREO TRINOCULAR\nMODEL AY11236\n40X,100X,400X,1000X COMPOUND\nMODEL AY11234 7X-45X ZOOM STEREO TRINOCULAR", - "page_start": 0, - "page_end": 0, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "PARTS LIST\nMicroscope Stand, Name = Microscope Stand. , Name = 4x (parfocal distance adjustable). , Name = 10x. , Name = 40x (s) (parfocal distance adjustable). , Name = 100x (oil,s) (parfocal distance adjustable). 10x Wide Field Eyepiece w/Pointer, Name = 10x Wide Field Eyepiece w/Pointer. Abbe Condenser NA1.25, Name = Abbe Condenser NA1.25. , Name = . Spare 6V20W Halogen Bulb, Name = Spare 6V20W Halogen Bulb. Lens Cleaning Tissue, Name = Lens Cleaning Tissue. Cedar Oil, Name = Cedar Oil. 1A Fuse (spare), Name = 1A Fuse (spare). Specification, Name = Specification. Inspection Certificate, Name = Inspection Certificate. Packing List, Name = Packing List", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Model AY11240\nName\nMicroscope Stand\nAchromatic\nObjective\nPlain Concave Mirror\n1\nPlastic Dust Cover\n1\n10x Wide Field Eyepiece\n1\nLens Cleaning Tissue\n1\nSpecification\n1\nInspection Certificate\n1\nPacking List\n1", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "TROUBLESHOOTING\n1. Image not clear., Possible Cause = 1.Specimen is in incorrect position. 2. Lens is dirty. 3. Cedar oil not placed on immersion objective. 4. Bubbles in Cedar oil.. 1. Image not clear., Solution = 1. Re-position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on immersion objective. 4. Rotate turret several times to eliminate bubbles.. 2. Poor illumination., Possible Cause = 1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.. 2. Poor illumination., Solution = 1. Re-position condenser. 2. Clean lens. 3. Re-position specimen so it is level.. 3. Illumination not bright., Possible Cause = 1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.. 3. Illumination not bright., Solution = 1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.. 4. Cannot focus at high magnification., Possible Cause = 1. Specimen is in incorrect position.. 4. Cannot focus at high magnification., Solution = 1. Re-position specimen.. 5. Objective lenses touch specimen., Possible Cause = 1. Stage is too high.. 5. Objective lenses touch specimen., Solution = 1. Re-position stage.\n18", - "page_start": 9, - "page_end": 9, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "For the AY11230 microscope, what is the interpupillary adjustment?", - "target_page": 7, - "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n12 2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.\n8", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Model AY11230\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: 60mm\n4. Elevator Adjustment Range: 110mm\n5. Right Diopter Adjustment Range: +4 to -6 dopters\n6. Illumination: Input Voltage: 110V AC or 220V Output: Oblique illumination: 12V 10W Halogen Lamp", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Model AY11228\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: 60mm\n4. Elevator Adjustment Range: 110mm\n5. Right Diopter Adjustment Range: +4 to -6 dopters\n6. Illumination: Input Voltage: 110V AC or 220V Output: Oblique illumination: 12V 10W Halogen Lamp", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Model AY11232\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: >50mm\n4. Elevator Adjustment Range: 110mm\n5. Diopter Adjustment Range: +/- 5 diopters\n6. Illumination:\nInput Voltage: 110V AC or 220V Output: Oblique Illumination: 12V 10W Halogen Lamp Transmitted Illumination: 12V 10W Halogen Lamp", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Model AY11234\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: >50mm\n4. Elevator Adjustment Range: 110mm\n5. Diopter Adjustment Range: +/- 5 diopters\n6. Illumination:\nInput Voltage: 110V AC or 220V Output: Oblique Illumination: 12V 10W Halogen Lamp Transmitted Illumination: 12V 10W Halogen Lamp", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "OPERATION ( cont. )\n6. Adjust the interpupillary distance by using the eyepiece interpupillary slide adjustment.\n7. Observe using the right eyepiece adjusting the coarse and fine focus and adjust the diopter ring until image is clear and sharp.\n8. Observe with the left eyepiece and adjust the diopter ring until image is clear and sharp.\n9. Rotate the fine focus adjustment when using other objectives. NOTE: This instrument is equipped with patent objectives so the precision or parfocalization is very high.\nFig. 1 - Objective Parts\n10. If the image is in focus with the 10x objective, you can select other objectives and observe the specimen even if the fine adjustment knob has not been used by using the following method (See Fig. 1):\n1. Unscrew the 40x or 100x objective and remove from turret.\n2. Remove the mark sleeve.\n3. Turn the ring on the objective to adjust its parfocal distance.\n4. Re-insert the objective and compare with the 10x.\n5. Adjust until the 40x and 100x objectives image is clear.", - "page_start": 9, - "page_end": 9, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MODEL AY11236\nModel AY11236", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "The illumination of my AY11236 microscope is not very strong, what can I do to solve this?", - "target_page": 10, - "target_passage": "1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "MODEL AY11236\nModel AY11236", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11230 and Model AY11234 are trinocular microscopes designed for biological studies such as specimen examination. They can also be used for examining bacteria and for general clinical and medical studies. Simple design and use and the vertical tube make them is useful for school classroom instruction.", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11236 is a powerful fixed power compound microscope designed for biological studies such as specimen examination. It can also be used for examining bacteria and for general clinical and medical studies and other scientific uses.", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11240 and Model AY11238 are designed for biological studies such as specimen examination. They can also be used for examining bacteria and for general clinical and medical studies. Simple design and use is especially useful for school classroom instruction.", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USAGE\nBARSKA Model AY11228 and Model AY11232 are designed for biological studies such as specimen examination. They can also be used for examining bacteria and for general clinical and medical studies. Simple design and use is especially useful for school classroom instruction.", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "CONSTRUCTION\nBARSKA Model AY11230 is a fixed power trinocular stereo microscope. It is constructed with two optical paths at the same angle. It is equipped with transmitted illumination and oblique illumination. By using this instrument, the user can observe and enlarge the right side stereo image. BARSKA Model AY11234 is a zoom trinocular stereo microscope. The object being viewed is enlarged through two identical sized sets of right and left eye lenses. The zoom provides different magnification and features an inversion system which allows the image to be viewed normally and right side up.\n10", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "CONSTRUCTION\nBARSKA Model AY11228 is a fixed power stereo microscope. It is constructed with two optical paths at the same angle. It is equipped with transmitted illumination and oblique illumination. By using this instrument, the user can observe and enlarge the right side stereo image. BARSKA Model AY11232 is a zoom stereo microscope. The object being viewed is enlarged through two identical sized sets of right and left eye lenses. The zoom provides different magnification and features an inversion system which allows the image to be viewed normally and right side up.\n6", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "CONSTRUCTION\nBARSKA Model AY11236 is a fixed power compound microscope. It is constructed with two optical paths at the same angle. It is equipped with transmitted illumination. By using this instrument, the user can observe specimens at magnification from 40x to 1000x by selecting the desired objective lens. Coarse and fine focus adjustments provide accuracy and image detail. The rotating head allows the user to position the eyepieces for maximum viewing comfort and easy access to all adjustment knobs.\n14", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "MICROSCOPE USER MANUAL\nMODEL AY11240 40X,100X,400X COMPOUND MONOCULAR\nMODEL AY11238 40X,100X,400X COMPOUND MONOCULAR\nMODEL AY11228 20X,40X STEREO BINOCULAR\nMODEL AY11232 7X-45X STEREO ZOOM\nMODEL AY11230 20X,40X STEREO TRINOCULAR\nMODEL AY11236\n40X,100X,400X,1000X COMPOUND\nMODEL AY11234 7X-45X ZOOM STEREO TRINOCULAR", - "page_start": 0, - "page_end": 0, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "SELECTING THE ILLUMINATION\n1. Depending on microscope use, select oblique or transmitted illumination.\n2. The Brightness Adjustment knobs change the oblique or transmitted light independently. The transmitted illuminator fluorescent lamp cannot be adjusted.\n3. The angle of the oblique lamp can be adjusted to ensure optimum lighting of the sample.\n1. Remove components from package. identify all parts before assembling.\n2. Check the input voltage to ensure that it conforms to the microscopes requirement.\n1. Depending on microscope use, select oblique or transmitted illumination.\n2. The Brightness Adjustment Knobs change the oblique or transmitted light independently. The transmitted illuminator fluorescent lamp cannot be adjusted.\n3. The angle of the oblique lamp can be adjusted to ensure optimum lighting of the sample.", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "What event marks the beginning of the field of artificial intelligence?", - "target_page": 22, - "target_passage": "The field of AI research was founded at a workshop at Dartmouth College in 1956.", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Artificial intelligence\nArtificial intelligence was founded as an academic discipline in 1956, [6] and the field went through multiple cycles of optimism throughout its history, [7][8] followed by periods of disappointment and loss of funding, known as AI winters. [9][10] Funding and interest vastly increased after 2012 when deep learning outperformed previous AI techniques. [11] This growth accelerated further after 2017 with the transformer architecture, [12] and by the early 2020s many billions of dollars were being invested in AI and the field experienced rapid ongoing progress in what has become known as the AI boom. The emergence of advanced generative AI in the midst of the AI boom and its ability to create and modify content exposed several unintended consequences and harms in the present and raised concerns about the risks of AI and its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety and benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Narrow vs. general AI\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and superintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these solutions will lead indirectly to the field's long-term goals. [378][379] General intelligence is difficult to define and difficult to measure, and modern AI has had more verifiable successes by focusing on specific problems with specific solutions. The sub-field of artificial general intelligence studies this area exclusively.", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Defining artificial intelligence\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\" [359] He advised changing the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to show intelligent behaviour\". [359] He devised the Turing test, which measures the ability of a machine to simulate human conversation. [323] Since we can only observe the behavior of the machine, it does not matter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these things about other people but \"it is usual to have a polite convention that everyone thinks.\" [360]\nRussell and Norvig agree with Turing that intelligence must be defined in terms of external behavior, not internal structure. [1] However, they are critical that the test requires the machine to imitate humans. \"Aeronautical engineering texts\", they wrote, \"do not define the goal of their field as making 'machines that fly so exactly like pigeons that they can fool other pigeons.' \" [362] AI founder John McCarthy agreed, writing that \"Artificial intelligence is not, by definition, simulation of human intelligence\". [363]\nMcCarthy defines intelligence as \"the computational part of the ability to achieve goals in the world\". [364] Another AI founder, Marvin Minsky similarly describes it as \"the ability to solve hard problems\". [365] The leading AI textbook defines it as the study of\nThe Turing test can provide some evidence of intelligence, but it penalizes non-human intelligent behavior. [361]\nagents that perceive their environment and take actions that maximize their chances of achieving defined goals. [1] These definitions view intelligence in terms of well-defined problems with well-defined solutions, where both the difficulty of the problem and the performance of the program are direct measures of the \"intelligence\" of the machine-and no other philosophical discussion is required, or may not even be possible.\nAnother definition has been adopted by Google, [366] a major practitioner in the field of AI. This definition stipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to the way it is defined in biological intelligence.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Artificial intelligence\nArtificial intelligence ( AI ), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. [1] Such machines may be called AIs.\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, many AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.\" [2][3]\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural language processing, perception, and support for robotics. [a] General intelligence-the ability to complete any task performed by a human on an at least equal level-is among the field's long-term goals. [4] To reach these goals, AI researchers have adapted and integrated a wide range of techniques, including search and mathematical optimization, formal logic, artificial neural networks, and methods based on statistics, operations research, and economics. [b] AI also draws upon psychology, linguistics, philosophy, neuroscience, and other fields. [5]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "General intelligence\nA machine with artificial general intelligence should be able to solve a wide variety of problems with breadth and versatility similar to human intelligence. [4]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia3.pdf" - }, - { - "text": "See also\nArtificial intelligence and elections - Use and impact of AI on political elections\nArtificial intelligence content detection - Software to detect AI-generated content\nBehavior selection algorithm - Algorithm that selects actions for intelligent agents\nBusiness process automation - Automation of business processes\nCase-based reasoning - Process of solving new problems based on the solutions of similar past problems\nComputational intelligence - Ability of a computer to learn a specific task from data or experimental observation\nDigital immortality - Hypothetical concept of storing a personality in digital form\nEmergent algorithm - Algorithm exhibiting emergent behavior\nFemale gendering of AI technologies - Gender biases in digital technology\nGlossary of artificial intelligence - List of definitions of terms and concepts commonly used in the study of artificial intelligence\nIntelligence amplification - Use of information technology to augment human intelligence\nIntelligent agent - Software agent which acts autonomously\nMind uploading - Hypothetical process of digitally emulating a brain\nOrganoid intelligence - Use of brain cells and brain organoids for intelligent computing\nRobotic process automation - Form of business process automation technology\nWetware computer - Computer composed of organic material", - "page_start": 27, - "page_end": 28, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Defining artificial intelligence\nSome authors have suggested in practice, that the definition of AI is vague and difficult to define, with contention as to whether classical algorithms should be categorised as AI, [367] with many companies during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not actually use AI in a material way\". [368]", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Symbolic AI and its limits\nSymbolic AI (or \"GOFAI\") [370] simulated the high-level conscious reasoning that people use when they solve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\" tasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems hypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent action.\" [371]\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning, recognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level \"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult. [372] Philosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious instinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than explicit symbolic knowledge. [373] Although his arguments had been ridiculed and ignored when they were first presented, eventually, AI research came to agree with him. [ab][16]\nThe issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that human intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research into symbolic AI will still be necessary to attain general intelligence, [375][376] in part because subsymbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a modern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial intelligence attempts to bridge the two approaches.", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "History\nUp to this point, most of AI's funding had gone to projects that used high-level symbols to represent mental objects like plans, goals, beliefs, and known facts. In the 1980s, some researchers began to doubt that this approach would be able to imitate all the processes of human cognition, especially perception, robotics, learning and pattern recognition, [335] and began to look into \"sub-symbolic\" approaches. [336] Rodney Brooks rejected \"representation\" in general and focussed directly on engineering machines that move and survive. [x] Judea Pearl, Lofti Zadeh, and others developed methods that handled incomplete and uncertain information by making reasonable guesses rather than precise logic. [86][341] But the most important development was the revival of \"connectionism\", including neural network research, by Geoffrey Hinton and others. [342] In 1990, Yann LeCun successfully showed that convolutional neural networks can recognize handwritten digits, the first of many successful applications of neural networks. [343]\nAI gradually restored its reputation in the late 1990s and early 21st century by exploiting formal mathematical methods and by finding specific solutions to specific problems. This \"narrow\" and \"formal\" focus allowed researchers to produce verifiable results and collaborate with other fields (such as statistics, economics and mathematics). [344] By 2000, solutions developed by AI researchers were being widely used, although in the 1990s they were rarely described as \"artificial intelligence\" (a tendency known as the AI effect). [345] However, several academic researchers became concerned that AI was no longer pursuing its original goal of creating versatile, fully intelligent machines. Beginning around 2002, they founded the subfield of artificial general intelligence (or \"AGI\"), which had several well-funded institutions by the 2010s. [4]", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia3.pdf" - }, - { - "text": "History\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. The study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, by shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical reasoning. [319][320] This, along with concurrent discoveries in cybernetics, information theory and neurobiology, led researchers to consider the possibility of building an \"electronic brain\". [r] They developed several areas of research that would become part of AI, [322] such as McCullouch and Pitts design for \"artificial neurons\" in 1943, [115] and Turing's influential 1950 paper 'Computing Machinery and Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was plausible. [323][320]\nThe field of AI research was founded at a workshop at Dartmouth College in 1956. [s][6] The attendees became the leaders of AI research in the 1960s. [t] They and their students produced programs that the press described as \"astonishing\": [u] computers were learning checkers strategies, solving word problems in algebra, proving logical theorems and speaking English. [v][7] Artificial intelligence laboratories were set up at a number of British and U.S. universities in the latter 1950s and early 1960s. [320]", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "What would a superintelligence need?", - "target_page": 27, - "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Superintelligence and the singularity\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the brightest and most gifted human mind. [379] If research into artificial general intelligence produced sufficiently intelligent software, it might be able to reprogram and improve itself. The improved software would be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and Vernor Vinge called a \"singularity\". [395]\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped curve, slowing when they reach the physical limits of what the technology can do. [396]", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Narrow vs. general AI\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and superintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these solutions will lead indirectly to the field's long-term goals. [378][379] General intelligence is difficult to define and difficult to measure, and modern AI has had more verifiable successes by focusing on specific problems with specific solutions. The sub-field of artificial general intelligence studies this area exclusively.", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Other sources\nAltman, Sam; Brockman, Greg; Sutskever, Ilya (22 May 2023). \"Governance of Superintelligence\" (https://openai.com/blog/governance-of-superintelligence). openai.com . Archived (https://web.archive.org/web/20230527061619/https://openai.com/blog/governanc e-of-superintelligence) from the original on 27 May 2023. Retrieved 27 May 2023.\nAnderson, Susan Leigh (2008). \"Asimov's \"three laws of robotics\" and machine metaethics\". AI & Society . 22 (4): 477-493. doi:10.1007/s00146-007-0094-5 (https://doi.org/10.1007%2Fs0 0146-007-0094-5). S2CID 1809459 (https://api.semanticscholar.org/CorpusID:1809459).\nAnderson, Michael; Anderson, Susan Leigh (2011). Machine Ethics . Cambridge University Press.\nArntz, Melanie; Gregory, Terry; Zierahn, Ulrich (2016), \"The risk of automation for jobs in OECD countries: A comparative analysis\", OECD Social, Employment, and Migration Working Papers 189\nAsada, M.; Hosoda, K.; Kuniyoshi, Y.; Ishiguro, H.; Inui, T.; Yoshikawa, Y.; Ogino, M.; Yoshida, C. (2009). \"Cognitive developmental robotics: a survey\". IEEE Transactions on Autonomous Mental Development . 1 (1): 12-34. doi:10.1109/tamd.2009.2021702 (https://doi.org/10.110 9%2Ftamd.2009.2021702). S2CID 10168773 (https://api.semanticscholar.org/CorpusID:101 68773).", - "page_start": 52, - "page_end": 52, - "source_file": "wikipedia3.pdf" - }, - { - "text": "General intelligence\nA machine with artificial general intelligence should be able to solve a wide variety of problems with breadth and versatility similar to human intelligence. [4]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Existential risk\nIt has been argued AI will become so powerful that humanity may irreversibly lose control of it. This could, as physicist Stephen Hawking stated, \"spell the end of the human race\". [265] This scenario has been common in science fiction, when a computer or robot suddenly develops a human-like \"self-awareness\" (or \"sentience\" or \"consciousness\") and becomes a malevolent character. [q] These sci-fi scenarios are misleading in several ways.\nFirst, AI does not require human-like sentience to be an existential risk. Modern AI programs are given specific goals and use learning and intelligence to achieve them. Philosopher Nick Bostrom argued that if one gives almost any goal to a sufficiently powerful AI, it may choose to destroy humanity to achieve it (he used the example of a paperclip factory manager). [267] Stuart Russell gives the example of household robot that tries to find a way to kill its owner to prevent it from being unplugged, reasoning that \"you can't fetch the coffee if you're dead.\" [268] In order to be safe for humanity, a superintelligence would have to be genuinely aligned with humanity's morality and values so that it is \"fundamentally on our side\". [269]\nSecond, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an existential risk. The essential parts of civilization are not physical. Things like ideologies, law, government, money and the economy are built on language; they exist because there are stories that billions of people believe. The current prevalence of misinformation suggests that an AI could use language to convince people to believe anything, even to take actions that are destructive. [270]\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and unconcerned by risk from eventual superintelligent AI. [271] Personalities such as Stephen Hawking, Bill Gates, and Elon Musk, [272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis Hassabis, and Sam Altman, have expressed concerns about existential risk from AI.", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Defining artificial intelligence\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\" [359] He advised changing the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to show intelligent behaviour\". [359] He devised the Turing test, which measures the ability of a machine to simulate human conversation. [323] Since we can only observe the behavior of the machine, it does not matter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these things about other people but \"it is usual to have a polite convention that everyone thinks.\" [360]\nRussell and Norvig agree with Turing that intelligence must be defined in terms of external behavior, not internal structure. [1] However, they are critical that the test requires the machine to imitate humans. \"Aeronautical engineering texts\", they wrote, \"do not define the goal of their field as making 'machines that fly so exactly like pigeons that they can fool other pigeons.' \" [362] AI founder John McCarthy agreed, writing that \"Artificial intelligence is not, by definition, simulation of human intelligence\". [363]\nMcCarthy defines intelligence as \"the computational part of the ability to achieve goals in the world\". [364] Another AI founder, Marvin Minsky similarly describes it as \"the ability to solve hard problems\". [365] The leading AI textbook defines it as the study of\nThe Turing test can provide some evidence of intelligence, but it penalizes non-human intelligent behavior. [361]\nagents that perceive their environment and take actions that maximize their chances of achieving defined goals. [1] These definitions view intelligence in terms of well-defined problems with well-defined solutions, where both the difficulty of the problem and the performance of the program are direct measures of the \"intelligence\" of the machine-and no other philosophical discussion is required, or may not even be possible.\nAnother definition has been adopted by Google, [366] a major practitioner in the field of AI. This definition stipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to the way it is defined in biological intelligence.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Exercise 18: Make Subclasses of NamedPizza Disjoint\n_____________________________________________________________________________________\n1. We want to make these subclasses of NamedPizza disjoint from each other. I.e., any individual can belong to at most one of these classes. To do that first select MargheritaPizza (or any other subclass of NamedPizza ).\n2. Click on the (+) sign next to Disjoint With near the bottom of the Description view. This will bring up a Class hierarchy view. Use this to navigate to the subclasses of NamedPizza and use to select all of the other sibling classes to the one you selected. Then select OK. You should now see the appropriate disjoint axioms showing up on each subclass of NamedPizza . Synchronize the reasoner. Your UI should look similar to figure 4.19 now.\nFigure 4.19 Subclasses of NamedPizza are Disjoint\n36", - "page_start": 36, - "page_end": 36, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Existential risk\nIn May 2023, Geoffrey Hinton announced his resignation from Google in order to be able to \"freely speak out about the risks of AI\" without \"considering how this impacts Google.\" [273] He notably mentioned risks of an AI takeover, [274] and stressed that in order to avoid the worst outcomes, establishing safety guidelines will require cooperation among those competing in use of AI. [275]\nIn 2023, many leading AI experts endorsed the joint statement that \"Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war\". [276]\nSome other researchers were more optimistic. AI pioneer Jürgen Schmidhuber did not sign the joint statement, emphasising that in 95% of all cases, AI research is about making \"human lives longer and healthier and easier.\" [277] While the tools that are now being used to improve lives can also be used by bad actors, \"they can also be used against the bad actors.\" [278][279] Andrew Ng also argued that \"it's a mistake to fall for the doomsday hype on AI-and that regulators who do will only benefit vested interests.\" [280] Yann LeCun \"scoffs at his peers' dystopian scenarios of supercharged misinformation and even, eventually, human extinction.\" [281] In the early 2010s, experts argued that the risks are too distant in\nthe future to warrant research or that humans will be valuable from the perspective of a superintelligent machine. [282] However, after 2016, the study of current and future risks and possible solutions became a serious area of research. [283]", - "page_start": 18, - "page_end": 19, - "source_file": "wikipedia3.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 12: Performance of each model for Bitext Mining, Semantic Textual Similarity (STS) and Summarization.\nuniversal-sentence-encoder-multilingual-3 universal-sentence-encoder-multilingual-large-3, STSBenchmarkMultilingual = 0.75. universal-sentence-encoder-multilingual-3 universal-sentence-encoder-multilingual-large-3, STS22 STS = 0.78. universal-sentence-encoder-multilingual-3 universal-sentence-encoder-multilingual-large-3, SICKFr = 0.71 0.74. universal-sentence-encoder-multilingual-3 universal-sentence-encoder-multilingual-large-3, SummEv alFr Summarization = 0.28 0.28. xlm-roberta-base xlm-roberta-large, Flor es_fr -en = 0.70. xlm-roberta-base xlm-roberta-large, Flor es_en-fr BitextMining = 0.53. xlm-roberta-base xlm-roberta-large, DiaBla_fr -en = 0.84. xlm-roberta-base xlm-roberta-large, STSBenchmarkMultilingual = 0.46. xlm-roberta-base xlm-roberta-large, STS22 STS = 0.71. xlm-roberta-base xlm-roberta-large, SICKFr = 0.49. xlm-roberta-base xlm-roberta-large, SummEv alFr Summarization = 0.29. , Flor es_fr -en = 0.65. , Flor es_en-fr BitextMining = 0.26. , DiaBla_fr -en = 0.21 0.13. , STSBenchmarkMultilingual = 0.78 0.42. , STS22 STS = 0.57 0.55. , SICKFr = 0.50. , SummEv alFr Summarization = 0.29", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv4.pdf" - }, - { - "text": "Further reading\nRoivainen, Eka, \"AI's IQ: ChatGPT aced a [standard intelligence] test but showed that intelligence cannot be measured by IQ alone\", Scientific American , vol. 329, no. 1 (July/August 2023), p. 7. \"Despite its high IQ, ChatGPT fails at tasks that require real humanlike reasoning or an understanding of the physical and social world.... ChatGPT seemed unable to reason logically and tried to rely on its vast database of... facts derived from online texts.\"\nScharre, Paul, \"Killer Apps: The Real Dangers of an AI Arms Race\", Foreign Affairs , vol. 98, no. 3 (May/June 2019), pp. 135-144. \"Today's AI technologies are powerful but unreliable. Rules-based systems cannot deal with circumstances their programmers did not anticipate. Learning systems are limited by the data on which they were trained. AI failures have already led to tragedy. Advanced autopilot features in cars, although they perform well in some circumstances, have driven cars without warning into trucks, concrete barriers, and parked cars. In the wrong situation, AI systems go from supersmart to superdumb in an instant. When an enemy is trying to manipulate and hack an AI system, the risks are even greater.\" (p. 140.)\nSchulz, Hannes; Behnke, Sven (1 November 2012). \"Deep Learning\" (https://www.researchgat e.net/publication/230690795). KI - Künstliche Intelligenz . 26 (4): 357-363. doi:10.1007/s13218-012-0198-z (https://doi.org/10.1007%2Fs13218-012-0198-z). ISSN 1610-1987 (https://search.worldcat.org/issn/1610-1987). S2CID 220523562 (https://ap i.semanticscholar.org/CorpusID:220523562).", - "page_start": 68, - "page_end": 69, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "Where can I find the Inspect tool to evaluate the safety of our models?", - "target_page": 21, - "target_passage": "The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations available under a MIT open-source licence which is freely available on GitHub", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Safer and healthier technologies and organisation\nTo support the practical implementation of preventive safety and health measures , numerous actors (e.g. organisations of OSH professionals and practitioners, and standardisation institutes such as the European Committee for Standardisation and the International Organisation for Standardisation) issued safety and health guidance or standards, or developed new and advanced OSH management systems, the engineering sciences worked on better technical preventive technologies, on measuring and monitoring technologies, the medical sciences introduced better medical diagnosis and treatment of work-related diseases, and the social sciences contributed with better knowledge on the legal and economic determinants of OSH, or analysed the characteristics of awareness raising, knowledge development and healthy work organisation.\nIt is obvious that better technical and organisational prevention at work contributed to more safety and the evident strong reduction in accidents. Prominent fields and examples of such improvements are: technically safer design of moving vehicles (e.g. for fork lifts or heavy trucks and machines, light and noise warning signals for moving vehicles); safer design of machines like automatic shutdowns or disconnections, two-hand operating of machines (e.g. for pressing and punching), safer cranes including better technologies for communication between co-workers, coverage of moving parts, safer company cars (e.g. safety belts and airbags), safer tools (e.g. for drilling or cutting); improved personal protective equipment like air-supplied breathing apparatus, steel mesh gloves for meat workers, trousers for forest workers that resist a chainsaw; minimum safety requirements for buildings (e.g. forms and size of stairs and handrails, fire exits and fire alarms, safer ladders and scaffolds), emergency equipment like eye wash and emergency showers; better monitoring of acute hazards (e.g. in sewage water systems), exhaust and ventilation technologies to avoid fumes, dusts, chemicals or contact with hazardous biological agents; strong safety obligations for work in confined spaces, or for work at height and work in trenches; introduction of explosion zones and of non-sparking tools, a comprehensive system of warning signals, warning signals for slippery floors and unsafe grounds, better warning systems and equipment in particularly dangerous work environments like road maintenance, combined with better organisational measures; quality systems that promote continuous repair and maintenance of tools; regular instructions by safety representatives and safety coordinators, and guarantee of minimum safety standards of machines and products by European standards like CE ('European Conformity').", - "page_start": 13, - "page_end": 13, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Safety\nIn developing safety technologies, we also look at the conditions that exist seconds before an unavoidable crash. With this information, we can provide technologies to minimize the impact and damage in addition to notifying the authorities and calling for assistance afterward. Because we are building on actual accident data, the final stage in the Safety Shield involves collecting and analyzing the data and feeding what we learn back into the development process. We have committed ourselves to introducing over ten new safety technologies during the next three years, spanning the entire driving range from the safe driving zone to the actual crash.\nFor more on safety at Nissan, please see the 2005 Nissan Sustainability Report\nSafety Shield-concept image\nAround View Monitor\nNissan Annual Report 2004", - "page_start": 47, - "page_end": 47, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "2019 using NACE Rev. 2 Sector A, C-N:\nTechnical safer design of moving vehicles, for example, fork lifts, heavy trucks and machines, light and noise warning signals for moving vehicles; safer design of machines like automatic shutdowns or disconnections, two-hand operating of machines, for example, for pressing and punching, safer cranes including better technologies for communication between co-workers, coverage of moving parts, safer company cars, for example, safety belts, safer tools, for example, for drilling or cutting; improved PPE like air-supplied breathing apparatus, steel-made gloves for meat workers, trousers that resist a chainsaw; minimum requirements for buildings, for example, forms and size of stairs and handrails, fire exits and fire alarms, safer ladders and scaffolds, 126 emergency equipment like eye wash and emergency shower; better monitoring of acute hazards, for example, in sewage water systems, exhaust and ventilation technologies, to avoid fumes, dusts, chemicals or contact with hazardous biological agents; strong safety obligations for work in confined spaces, work at height and work in trenches; introduction of explosion zones and of non-sparking tools, a comprehensive system of warning signals, warning signals for slippery floors and unsafe grounds, better warning systems and equipment in\nEuropean Agency for Safety and Health at Work - EU-OSHA\n62\nOccupational safety and health in Europe - state and trends 2023\nparticularly dangerous work environments like road maintenance, combined with better organisational measures; quality systems that promote continuous repair and maintenance of tools; regular instructions by safety representatives and safety coordinators, and guarantee of minimum safety standards of machines and products by European standards like CE and CEE.\nIf an accident takes place, the technical and organisational measures were either not perfect for all conceivable situations or not fully implemented. Based on ESAW, Eurostat analysed the physical activities per sector that trigger non-fatal and fatal accidents at work in the EU27 (in 2019). 127\nTable 14: Accidents at work by physical activity 2019 - Eurostat\nNote: Due to incomplete notifications of the 'Physical Activity', the percentages do not sum up to 100%. Also, the sums of the numbers are lower than the number of all reported work accidents.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n63\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 61, - "page_end": 63, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "UNDERSTANDING QUICK ANALYSIS\nThe Quick Analysis tools were developed in response to the fact that users weren't using or even aware of the more powerful analytical tools found in Excel. So Excel decided to combine", - "page_start": 35, - "page_end": 35, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Evaluation\nIt is critical to ensure that AI systems are safe, ethical, and without bias in the clinical domain. For the proposed approach, we performed comprehensive automatic evaluations and a novel, rigorous, patient safety-focused clinical evaluation. The unique clinical evaluation framework was designed to (1) screen for and identify the common, specific correctness issues in LLMs observed in longform clinical summarization and (2) assess the potential patient safety implications associated with any incorrectness identified using a modified version of the World Health Organization's International Classification for Patient Safety. 45", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed8.pdf" - }, - { - "text": "The Quick Analysis Button\nThe Quick Analysis button appears when a range is selected in a worksheet. Clicking on the button displays the Quick Analysis gallery which contains quick analysis tools that can be applied to the selected data.\nThe tools have been organised along tabs at the top -\nFORMATTING , CHARTS , TOTALS , TABLES , and SPARKLINES .\nWhen you click on a tab, options specific to that tab are presented.\nLive Preview with some of these tools to create the Quick Analysis tools.", - "page_start": 35, - "page_end": 35, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "SAFETY IMPROVING\nThe health and safety of employees is of paramount concern to Santos. Santos delivered another year of improvement in 2004 and achieved its lowest total recordable case frequency rate of 6.4.\nFurther improvements were also made with the implementation of the Environment, Health and Safety Management System standards, with Santos operations undergoing full assessments against standards for the first time.\nThe results demonstrated considerable improvement over the baseline assessments conducted in 2003 with steady progress in the implementation of the procedures, processes and tools needed to achieve the requirements of the standards.\nProcess safety capability which deals with plant and equipment integrity assurance, design and construction, and maintenance, is being developed through the formation of a new set of standards to be incorporated\ninto the health and safety management system.\nThe safety focus in 2005 will be on finalising a comprehensive set of hazard standards which outline the required controls to ensure that hazards encountered across Santos' operations and activities are well managed.", - "page_start": 27, - "page_end": 27, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Clinical Evaluation Tasks\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on patient safety, the 3 expert clinicians determined none of the identified model performance issues were anticipated to create a level 1 (life-threatening) safety event (see examples of worst case scenarios in eTable 2 in Supplement 1). While the incompleteness and faulty logic identified in the automated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively; 13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create a level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the physician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4 and 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no patient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%) compared with the physician-written notes (2.0%), although very few hallucinations.\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness, and 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness, curation, correctness, and usefulness and suggest fair reliability for readability among the 3 raters.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "Safety and Environment\nSundance has a strong culture throughout the organisation of ensuring that high standards of safety are maintained and that our operations are conducted in an environmentally responsible way. During 2014 our comprehensive safety program was enhanced and further improvements will be a strong focus throughout 2015.", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Criticise:\nAnalyse, identify and evaluate good and bad characteristics, and give your opinion based on the evidence you present", - "page_start": 39, - "page_end": 39, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "What was the age category of most new opiate/crack users during the crime peak in the mid-1990s?", - "target_page": 9, - "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Charts showing age-of-onset distributions (by percentage of total cohort) for different cohorts based on year of first treatment\nNew opiate and crack-cocaine users: characteristics and trends\n31\nNew opiate and crack-cocaine users: characteristics and trends\n32", - "page_start": 30, - "page_end": 31, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Executive summary\n It is estimated that around 5,000 to 8,000 individuals started using opiates or crackcocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent 2 . Furthermore, of the new positive testers in 2013, only 721 were aged 18-24. 3 Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. 9 Given evidence suggesting that the average age of initiation for opiate/crack use is around 18-20 (Millar et al ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.\nNew opiate and crack-cocaine users: characteristics and trends\n9\nbefore 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of new users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay et al ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\nFigure 2: Year of birth distribution for all opiate-only/positive-for-both tests.\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.\nNew opiate and crack-cocaine users: characteristics and trends\n10\nFigure 3: Distribution of tester's age at positive test for all opiate-only/positive-for-both tests.", - "page_start": 8, - "page_end": 10, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Proportion of the total opiate and cocaine using population covered by each individual LAA.\nNew opiate and crack-cocaine users: characteristics and trends\n40", - "page_start": 39, - "page_end": 39, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Executive summary\n Analysis also revealed some possible changes in characteristics of the new opiate/crackcocaine initiates. There is a trend in the treatment data towards new initiates coming to treatment earlier in their drug-using careers than previous cohorts and also to have\n1 At the time of writing, data was unavailable for the period after November 2013.\n2 It is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data.\n3 787 if adjusted for the missing month.\nNew opiate and crack-cocaine users: characteristics and trends\n3\ninitiated use at an older age. Currently it is not possible to determine whether this is a reporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users.\n The report has several important policy implications. Even though numbers of new initiates involved with crime have dropped to the low thousands, putting downward pressure on crime, identification and early diversion to treatment remains paramount. Frontier Economics have estimated that the average 4 lifetime crime cost of an injecting drug user is £445,000, so the potential for social harm - even from a small number of individuals - remains large and potentially long-lasting. This means local areas need to manage both the (relatively large) stock of current users, and the (much smaller) flow of new initiates, whose treatment needs may be different. There is no evidence of any new epidemic in this country, but given the impact of the epidemic of the 80s and early 90s on crime, ongoing monitoring of recent trends is required to spot early signs of any emerging problems.", - "page_start": 2, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\ninvolved opiate/crack users will quit (or die) before being arrested and tested; 3) DIP's geographical coverage is not 100 per cent; 4) Some may evade arrest through the entire series; and 5) Evidence suggests OCUs cycle in and out of periods of regular use and offending rather than offend at a high rate continuously. But clearly the gradual capture of the pre-existing population creates a big enough bias such that we cannot read the figures for new positive testers simply as an incidence trend for crime-involved opiate/crack users.\nNew opiate and crack-cocaine users: characteristics and trends\n17\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.", - "page_start": 16, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "2. Estimating an incidence trend from treatment data\nbetween March 2011 and March 2015 can also be seen in the raw numbers for total new OCU treatment presentations. 22\nFigure 10: New treatment presentations for opiate/crack use.\nFigure 10 shows that, rather than increasing in the current year, new presentations for opiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a decrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics have been missed before (see Morgan, 2014), and the potential social harm that a fresh increase in new OCUs could cause, further analysis was conducted on the most recent data to try and determine whether the apparent flattening in trends was actually caused by the early stages of a significant surge in new users.\nThe treatment data was broken down by age to check whether the slight fall in total new presentations in 2014/15 masked an increase in younger treatment presentations. This showed instead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to 3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a faster rate over the last year than for those aged over-25. Furthermore, separate statistics produced for those in treatment aged 18-and-under also show a fall in aggregate numbers in treatment for opiates and crack.\nWe also looked at trends at the local level, given that previous epidemics have started in very specific areas and have taken several years to spread nationally. This means that the start of an epidemic can be hidden in the national data because it has not reached enough areas to register.\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment before. So unlike our definition of 'new' elsewhere it includes individuals who have been to treatment previously.\nNew opiate and crack-cocaine users: characteristics and trends\n27\nThe analysis showed that of the 149 Drug Action Team areas in England, 72 per cent had decreases in new OCU treatment numbers in the year to September 2014 compared to the previous year. Furthermore, of the 42 areas showing an increase, only 11 also showed a rise for the 12 months to September 2010 compared with the 12 months to September 2014, and most of these involved small numbers of individuals.", - "page_start": 26, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Conclusion\nThis report has attempted to draw together available data and evidence to estimate the number of new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look briefly at their characteristics. This is important as previous research has suggested that mostly through the actions of a minority - this group has the potential to have a large impact on crime trends and therefore to impose significant societal costs.\nThough data on this population is imperfect, a number of different data sources and methodologies are available to estimate OCU incidence. From these, three key conclusions emerge:\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s and early 1990s and has even dropped 20-45% since 2005.\n This means numbers of new users in 2013 may be around 5,000-8,000 with an approximate upper bound of 10,000; and numbers involved with prolific criminality will be lower still.\n The downward trend in new OCUs has flattened since about 2011, but available data do not suggest that this is the precursor to a new increase. If anything, the downward trend may resume in 2014, though the situation requires further monitoring.\nFor local areas then, this report suggests that it is still important to identify new OCUs as the arrestee data showed that a proportion of these are likely to offend over a long period of time. But also, there was some evidence of a shift to older initiates, which may require a slightly different treatment approach.\nNew opiate and crack-cocaine users: characteristics and trends\n30", - "page_start": 29, - "page_end": 29, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\nper year.Adjusted 2013 = 898. 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = . 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 4,281. 2013, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 4,670. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = 12,246. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = 13,710. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = 21,069. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 22,916. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 25,442. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 23,973. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 23,618. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 18,843. Total, Number of unique individuals with positive opiate/opiate", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\n= . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = . 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 7,913. 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,017. 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 643. 2011, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 701. 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = . 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 6,022. 2012, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 823. 2012, Number of unique individuals with positive opiate/opiate + cocaine tests", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "According to the National Database Treatment Monitoring System, how many people started using opiates/crack between 2005 and 2014?", - "target_page": 22, - "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "2. Estimating an incidence trend from treatment data\nThis section uses treatment data from the National Database Treatment Monitoring System (NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the numbers of people presenting to services with problem drug misuse and information about the drug treatment they receive. All drug treatment agencies in England provide a basic level of information to the NDTMS on their activities each month. The data for this report included all unique individuals presenting to treatment with opiates or crack-cocaine listed as their primary drug between 2005 and 2014. All individuals whose age of first use was listed as below ten or before 2005 were then excluded. Excluding individuals who started using opiates/crack before 2005 resulted in a large number of records being left out, due to the fact that the majority of the treatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack use surged in the UK. However, this exclusion is necessary for the incidence methodology, as explained later in this section. The remaining dataset included 52,829 individuals, as shown in Table 10.\nTable 10: Descriptive statistics from the NDTMS data.", - "page_start": 21, - "page_end": 21, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "2. Estimating an incidence trend from treatment data\nThe majority of those presenting for treatment between 2005 and 2014 started using opiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014. This suggests an average of just under 5,000 new starters per year during this period. But this would be an under-estimate of incidence because it is likely that some of those who began use between 2005 and 2014 would not yet have come to treatment during that period.\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et al . (2001) and Hickman et al . (2001). These papers discuss the methodology in detail.\nNew opiate and crack-cocaine users: characteristics and trends 22 In brief, the method uses the lag-to-treatment distribution for the sample coupled with the number of new treatment presentations in a given year to estimate OCU incidence in that year. So, when presenting to treatment, all individuals are asked to provide the year in which they first began using their primary drug, which for this analysis was limited to opiates and/or crack-\ncocaine. From this information it is possible to create a distribution, for all presentations, of the lag-time between initiation and their first presentation at treatment. This might show - for example - that only ten per cent of all individuals presenting to treatment do so in the first year of use, but that 25 per cent present within two years, and so on. This means that for each year, we can estimate the number of individuals who have begun an opiate-crack career but who have yet to come to treatment . Adding these to the numbers who began in that year and have come to treatment gives our total incidence estimate for each year.\nThe first model uses NDTMS data for the cohort starting use in 2005 (n=8,960), the lag-time distribution for those initiating use in 2005 and presenting to treatment between 2005 and 2014 18 is shown below.\nTable 11: Time-to-treatment distribution for those initiating use in 2005 and presenting to treatment between 2005 and 2014. 19", - "page_start": 21, - "page_end": 22, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Aims and Methodology\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few individuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to acquisitive crime at all (Morgan, 2014).\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at various different levels of geography, see for example: De Angelis et al ., 2004, Millar et al ., 2001 and Hickman et al ., 2001.\nNew opiate and crack-cocaine users: characteristics and trends\n4\nmethods for calculating incidence are complicated and imperfect. It should be acknowledged in advance that this paper does not fully resolve these issues. It is merely intended as a first step, to obtain workable estimates upon which to base policy until more sophisticated methods are developed. That said, every effort is made in this analysis to sense-check the results against other available datasets. The datasets used and the structure of the paper is as follows.\ni) Drug Interventions Programme (DIP) data. In part one, we produce general descriptive statistics from these data, which capture individuals who test positive for opiates/crack-cocaine following arrest or charge. Due to the limitations in coverage of these data over time, we draw only broad conclusions, some of which act as a sensecheck for the main results from part two.\nii) Data on presentations to treatment from the National Drug Treatment Monitoring System (NDTMS). In part two, we use two models based on previous research papers to calculate OCU incidence at the national level between 2005 and 2013. Most of the main conclusions come from this section.\nNew opiate and crack-cocaine users: characteristics and trends\n5", - "page_start": 3, - "page_end": 4, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Executive summary\n It is estimated that around 5,000 to 8,000 individuals started using opiates or crackcocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent 2 . Furthermore, of the new positive testers in 2013, only 721 were aged 18-24. 3 Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\ninvolved opiate/crack users will quit (or die) before being arrested and tested; 3) DIP's geographical coverage is not 100 per cent; 4) Some may evade arrest through the entire series; and 5) Evidence suggests OCUs cycle in and out of periods of regular use and offending rather than offend at a high rate continuously. But clearly the gradual capture of the pre-existing population creates a big enough bias such that we cannot read the figures for new positive testers simply as an incidence trend for crime-involved opiate/crack users.\nNew opiate and crack-cocaine users: characteristics and trends\n17\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.", - "page_start": 16, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "2. Estimating an incidence trend from treatment data\nbetween March 2011 and March 2015 can also be seen in the raw numbers for total new OCU treatment presentations. 22\nFigure 10: New treatment presentations for opiate/crack use.\nFigure 10 shows that, rather than increasing in the current year, new presentations for opiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a decrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics have been missed before (see Morgan, 2014), and the potential social harm that a fresh increase in new OCUs could cause, further analysis was conducted on the most recent data to try and determine whether the apparent flattening in trends was actually caused by the early stages of a significant surge in new users.\nThe treatment data was broken down by age to check whether the slight fall in total new presentations in 2014/15 masked an increase in younger treatment presentations. This showed instead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to 3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a faster rate over the last year than for those aged over-25. Furthermore, separate statistics produced for those in treatment aged 18-and-under also show a fall in aggregate numbers in treatment for opiates and crack.\nWe also looked at trends at the local level, given that previous epidemics have started in very specific areas and have taken several years to spread nationally. This means that the start of an epidemic can be hidden in the national data because it has not reached enough areas to register.\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment before. So unlike our definition of 'new' elsewhere it includes individuals who have been to treatment previously.\nNew opiate and crack-cocaine users: characteristics and trends\n27\nThe analysis showed that of the 149 Drug Action Team areas in England, 72 per cent had decreases in new OCU treatment numbers in the year to September 2014 compared to the previous year. Furthermore, of the 42 areas showing an increase, only 11 also showed a rise for the 12 months to September 2010 compared with the 12 months to September 2014, and most of these involved small numbers of individuals.", - "page_start": 26, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 1: Results of all DIP tests, 2004-2013.\nOpiates), 2011 = 16,387. Both (Cocaine & Opiates), 2012 = 13,525. Both (Cocaine & Opiates), 2013 = 10,594. Both (Cocaine & Opiates), 2013 adjusted = 11,557. Both (Cocaine & Opiates), Total = 206,522. Both (Cocaine & Opiates), Adjusted Total = 207,485. Total (opiates + both), 2004 = 21,102. Total (opiates + both), 2005 = 29,305. Total (opiates + both), 2006 = 50,042. Total (opiates + both), 2007 = 52,549. Total (opiates + both), 2008 = 49,361. Total (opiates + both), 2009 = 44,599. Total (opiates + both), 2010 = 41,532. Total (opiates + both), 2011 = 31,211. Total (opiates + both), 2012 = 25,506. Total (opiates + both), 2013 = 19,330. Total (opiates + both), 2013 adjusted = 21,087. Total (opiates + both), Total = 364,537. Total (opiates + both), Adjusted Total = 366,294. Total (All), 2004 = 60,191. Total (All), 2005 = 82,486. Total (All), 2006 = 183,632. Total (All), 2007 = 213,437. Total (All), 2008 = 226,821. Total (All), 2009 = 221,679. Total (All), 2010 = 221,485. Total (All), 2011 = 212,146. Total (All), 2012 = 166,297. Total (All), 2013 = 104,162. Total (All), 2013 adjusted = 113,631. Total (All), Total = 1,692,336. Total (All), Adjusted Total = 1,701,805. Opiates/both as a percentage of total tests, 2004 = 35%. Opiates/both as a percentage", - "page_start": 6, - "page_end": 6, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\n+ cocaine tests per year.2012 = 16,195. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 12,353. Total, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 13,476", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\n14 Note that this rate is, in effect, the rate of arrest-and-testing-positive.\n15 The technical annex contains a section on exactly how this range was estimated.\nNew opiate and crack-cocaine users: characteristics and trends\n19\nTable 9: Table showing the age breakdown of individuals testing positive for opiates-only or positive-for-both as a proportion of all individuals first testing positive in that year.", - "page_start": 18, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. 9 Given evidence suggesting that the average age of initiation for opiate/crack use is around 18-20 (Millar et al ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.\nNew opiate and crack-cocaine users: characteristics and trends\n9\nbefore 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of new users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay et al ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\nFigure 2: Year of birth distribution for all opiate-only/positive-for-both tests.\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.\nNew opiate and crack-cocaine users: characteristics and trends\n10\nFigure 3: Distribution of tester's age at positive test for all opiate-only/positive-for-both tests.", - "page_start": 8, - "page_end": 10, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "What proportion of opiate users tested in 2004 were still positive a decade later?", - "target_page": 18, - "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n2004, Number of tests per year (positive opiate/opiate + cocaine).2004 = 17,174. 2004, Number of tests per year (positive opiate/opiate + cocaine).2005 = 5,604. 2004, Number of tests per year (positive opiate/opiate + cocaine).2006 = 7,091. 2004, Number of tests per year (positive opiate/opiate + cocaine).2007 = 6,784. 2004, Number of tests per year (positive opiate/opiate + cocaine).2008 = 6,509. 2004, Number of tests per year (positive opiate/opiate + cocaine).2009 = 5,292. 2004, Number of tests per year (positive opiate/opiate + cocaine).2010 = 4,863. 2004, Number of tests per year (positive opiate/opiate + cocaine).2011 = 3,341. 2004, Number of tests per year (positive opiate/opiate + cocaine).2012 = 2,629. 2004, Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,800. 2004, Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 1,964. 2005, Number of tests per year (positive opiate/opiate + cocaine).2004 = . 2005, Number of tests per year (positive opiate/opiate + cocaine).2005 = 13,553. 2005, Number of tests per year (positive opiate/opiate + cocaine).2006 = 6,066. 2005, Number of tests per year (positive opiate/opiate + cocaine).2007 = 5,110. 2005, Number of tests per year (positive opiate/opiate + cocaine).2008 = 4,941. 2005, Number of tests per year (positive opiate/opiate + cocaine).2009 = 3,983. 2005, Number of tests per year (positive opiate/opiate + cocaine).2010 = 3,549. 2005, Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,323. 2005, Number of tests per year (positive", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\n2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = 12,246. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = 3,171. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = 3,299. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 3,090. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 2,992. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,573. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 2,311. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 1,766. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,513. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 1,092. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 1,191. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = 10,539. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = 3,020. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 2,539. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 2,478. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,083. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 1,844. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,105. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2011. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = . , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = . , Number of tests per year (positive opiate/opiate + cocaine).2011 = . , Number of tests per year (positive opiate/opiate + cocaine).2012 = 7,265. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,359", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,704. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2008. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = 14,683. , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = 4,054. , Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,383. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 1,824. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,318", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,438. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2009. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = . , Number of tests per year (positive opiate/opiate + cocaine).2009 = 13,075. , Number of tests per year (positive opiate/opiate + cocaine).2010 = . , Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,332. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 1,638. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,154 1,259. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2010. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = . , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = . , Number of tests per year (positive opiate/opiate + cocaine).2011 = 9,595. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 1,714. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,013", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,483. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2012. 2013, Number of tests per year (positive opiate/opiate + cocaine).2004 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2005 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2006 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2007 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2008 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2009 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2010 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2011 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2012 = . 2013, Number of tests per year (positive opiate/opiate + cocaine).2013 = 5,523. 2013, Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 6,025. Total, Number of tests per year (positive opiate/opiate + cocaine).2004 = 17,174. Total, Number of tests per year (positive opiate/opiate + cocaine).2005 = . Total, Number of tests per year (positive opiate/opiate + cocaine).2006 = 19,157", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\nopiate/opiate + cocaine).2012 = 1,947. 2005, Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,383. 2005, Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 1,509. 2006, Number of tests per year (positive opiate/opiate + cocaine).2004 = . 2006, Number of tests per year (positive opiate/opiate + cocaine).2005 = 20,656. 2006, Number of tests per year (positive opiate/opiate + cocaine).2006 = . 2006, Number of tests per year (positive opiate/opiate + cocaine).2007 = 7,784. 2006, Number of tests per year (positive opiate/opiate + cocaine).2008 = 6,152. 2006, Number of tests per year (positive opiate/opiate + cocaine).2009 = 5,139. 2006, Number of tests per year (positive opiate/opiate + cocaine).2010 = 4,629. 2006, Number of tests per year (positive opiate/opiate + cocaine).2011 = 3,257. 2006, Number of tests per year (positive opiate/opiate + cocaine).2012 = 2,649. 2006, Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,806. 2006, Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 1,970. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = 17,613. , Number of tests per year (positive opiate/opiate + cocaine).2007 = 5,747. , Number of tests per year (positive opiate/opiate + cocaine).2008 = 4,309. , Number of tests per year (positive opiate/opiate + cocaine).2009 = 3,855. , Number of tests per year (positive opiate/opiate", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n+ cocaine).2010 = 2,619. , Number of tests per year (positive opiate/opiate + cocaine).2011 = . , Number of tests per year (positive opiate/opiate + cocaine).2012 = 2,119. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,555\n1,696. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2007. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = 17,883. , Number of tests per year (positive opiate/opiate + cocaine).2008 = 4,970. , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = 4,026. , Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,626. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 2,180. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,562", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\nof unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,291. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 2,091. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 1,567. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,334. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 954. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 1,041. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = . 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = . 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 13,629. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,670. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 2,263. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 1,612. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,366. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 978. 2008, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 1,067. 2009, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2009, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2009, Number of unique individuals with positive opiate/opiate + cocaine tests per", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\nyear.2011 = 1,350. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,156. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 862. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 940. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = 14,750. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 3,896. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 3,280. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,701. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 2,507. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 1,819. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,610. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 1,140. 2006, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 1,244. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = . 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = . 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 13,391. 2007, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 3,063. 2007, Number", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "Who led the Fronde des princes?", - "target_page": 4, - "target_passage": "It was headed by the highest-ranking French nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Early acts\nUnfortunately for Anne, her partial victory depended on Condé, who wanted to control the queen and destroy Mazarin's influence. It was Condé's sister who pushed him to turn against the queen. After striking a deal with her old friend Marie de Rohan, who was able to impose the nomination of Charles de l'Aubespine, marquis de Châteauneuf as minister of justice, Anne arrested Condé, his brother Armand de Bourbon, Prince of Conti, and the husband of their sister Anne Genevieve de Bourbon, duchess of Longueville. This situation did not last long, and Mazarin's unpopularity led to the creation of a coalition headed mainly by Marie de Rohan and the duchess of Longueville. This aristocratic coalition was strong enough to liberate the princes, exile Mazarin, and impose a condition of virtual house arrest on Queen Anne.\nPortrait by Justus van Egmont between the years 1649-1652.\nAll these events were witnessed by Louis and\nlargely explained his later distrust of Paris and the higher aristocracy. [27] \"In one sense, Louis's childhood came to an end with the outbreak of the Fronde. It was not only that life became insecure and unpleasant - a fate meted out to many children in all ages - but that Louis had to be taken into the confidence of his mother and Mazarin on political and military matters of which he could have no deep understanding\". [28] \"The family home became at times a near-prison when Paris had to be abandoned, not in carefree outings to other chateaux but in humiliating flights\". [28] The royal family was driven out of Paris twice in this manner, and at one point Louis XIV and Anne were held under virtual arrest in the royal palace in Paris. The Fronde years planted in Louis a hatred of Paris and a consequent determination to move out of the ancient capital as soon as possible, never to return. [29]\nJust as the first Fronde (the Fronde parlementaire of 1648-1649) ended, a second one (the Fronde des princes of 1650-1653) began. Unlike that which preceded it, tales of sordid intrigue and half-hearted warfare characterized this second phase of upper-class insurrection. To the aristocracy, this rebellion represented a protest for the reversal of their political demotion from vassals to courtiers. It was headed by the highest-ranking French", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Early acts\nnobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle ; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.\nQueen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son. In addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The Frondeurs claimed to act on Louis's behalf, and in his real interest, against his mother and Mazarin.\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's stepfather by a secret marriage to Queen Anne. [30] However, Louis's coming-of-age and subsequent coronation deprived them of the Frondeurs ' pretext for revolt. The Fronde thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly from exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of Anne, who was no longer regent. [31]", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Early acts\nAs the Thirty Years' War came to an end, a civil war known as the Fronde erupted in France. It effectively checked France's ability to exploit the Peace of Westphalia. Anne and Mazarin had largely pursued the policies of Cardinal Richelieu, augmenting the Crown's power at the expense of the nobility and the Parlements . Anne was more concerned with internal policy than foreign affairs; she was a very proud queen who insisted on the divine rights of the King of France. [22]\nAll this led her to advocate a forceful policy in all matters relating to the King's authority, in a manner that was much more radical than the one proposed by Mazarin. The Cardinal depended totally on Anne's support and had to use all his influence on the Queen to temper some of her radical actions. Anne imprisoned any aristocrat or member of parliament who challenged her will; her main aim was to transfer to her son an absolute authority in the matters of finance and justice. One of the leaders of the Parlement of Paris, whom she had jailed, died in prison. [23]\nThe Frondeurs , political heirs of the disaffected feudal aristocracy, sought to protect their traditional feudal privileges from the increasingly centralized royal government. Furthermore, they believed their traditional influence and authority was being usurped by the recently ennobled bureaucrats (the Noblesse de Robe , or \"nobility of the robe\"), who administered the kingdom and on whom the monarchy increasingly began to rely. This belief intensified the nobles' resentment.\nIn 1648, Anne and Mazarin attempted to tax members of the Parlement de Paris . The members refused to comply and ordered all of the king's earlier financial edicts burned. Buoyed by the victory of Louis, duc d'Enghien (later known as le Grand Condé ) at the Battle of Lens, Mazarin, on Queen Anne's insistence, arrested certain members in a show of force. [24] The most important arrest, from Anne's point of view, concerned Pierre Broussel, one of the most important leaders in the Parlement de Paris .", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Height of power\nLouis's extravagance at Versailles extended far beyond the scope of elaborate court rituals. He took delivery of an African elephant as a gift from the king of Portugal. [63] He encouraged leading nobles to live at Versailles. This, along with the prohibition of private armies, prevented them from passing time on their own estates and in their regional power bases, from which they historically waged local wars and plotted resistance to royal authority. Louis thus compelled and seduced the old military aristocracy (the \"nobility of the sword\") into becoming his ceremonial courtiers, further weakening their power. In their place, he raised commoners or the more recently ennobled bureaucratic aristocracy (the \"nobility of the robe\"). He judged that royal authority thrived more surely by filling high executive and administrative positions with these men because they could be more easily dismissed than nobles of ancient lineage and entrenched influence. It is believed that Louis's policies were rooted in his\nexperiences during the Fronde , when men of high birth readily took up the rebel cause against their king, who was actually the kinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French Revolution about a century later.", - "page_start": 8, - "page_end": 9, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Early acts\nPeople in France were complaining about the expansion of royal authority, the high rate of taxation, and the reduction of the authority of the Parlement de Paris and other regional representative entities. Paris erupted in rioting as a result, and Anne was forced, under intense pressure, to free Broussel. Moreover, on the night of 9-10 February 1651, when Louis was twelve, a mob of angry Parisians broke into the royal palace and demanded to see their king. Led into the royal bed-chamber, they gazed upon Louis, who was feigning sleep, were appeased, and then quietly departed. [25] The threat to the royal family prompted Anne to flee Paris with the king and his courtiers.\nShortly thereafter, the conclusion of the Peace of Westphalia allowed Condé's army to return to aid Louis and his court. Condé's family was close to Anne at that time, and he agreed to help her attempt to restore the king's authority. [26] The queen's army, headed by\nBaptismal certificate, 1638\nLouis XIV, then Dauphin of France, in 1642, one year before his accession to the throne, by Philippe de Champaigne\nLouis XIV in 1643, by Claude Deruet\nEurope after the Peace of Westphalia in 1648\nCondé, attacked the rebels in Paris; the rebels were under the political control of Anne's old friend Marie de Rohan. Beaufort, who had escaped from the prison where Anne had incarcerated him five years before, was the military leader in Paris, under the nominal control of Conti. After a few battles, a political compromise was reached; the Peace of Rueil was signed, and the court returned to Paris.", - "page_start": 2, - "page_end": 3, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Marriages and children\nLouis and his wife Maria Theresa of Spain had six children from the marriage contracted for them in 1660. However, only one child, the eldest, survived to adulthood: Louis, le Grand Dauphin , known as Monseigneur . Maria Theresa died in 1683, whereupon Louis remarked that she had never caused him unease on any other occasion.\nDespite evidence of affection early on in their marriage, Louis was never faithful to Maria Theresa. He took a series of mistresses, both official and unofficial. Among the better documented are Louise de La Vallière (with whom he had five children; 1661-1667), Bonne de Pons d'Heudicourt (1665), Catherine Charlotte de Gramont (1665), FrançoiseAthénaïs, Marquise de Montespan (with whom he had seven children; 1667-1680), Anne de Rohan-Chabot (1669-1675), Claude de Vin des Œillets (one child born in 1676),\nWedding of Louis and Maria Theresa\nIsabelle de Ludres (1675-1678), and Marie Angélique de Scorailles (1679-1681), who died at age 19 in childbirth. Through these liaisons, he produced numerous illegitimate children, most of whom he married to members of cadet branches of the royal family.\nLouis proved relatively more faithful to his second wife, Françoise d'Aubigné, Marquise de Maintenon. He first met her through her work caring for his children by Madame de Montespan, noting the care she gave to his favourite, Louis Auguste, Duke of Maine. [103] The king was, at first, put off by her strict religious practice, but he warmed to her through her care for his children. [103]\nWhen he legitimized his children by Madame de Montespan on 20 December 1673, Françoise d'Aubigné became the royal governess at Saint-Germain. [103] As governess, she was one of very few people permitted to speak to him as an equal, without limits. [103] It is believed that they were married secretly at Versailles on or around 10 October 1683 [104] or January 1684. [105] This marriage, though never announced or publicly discussed, was an open secret and lasted until his death. [106]", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Causes and conduct of the war\nThe Nine Years' War, which lasted from 1688 to 1697, initiated a period of decline in Louis's political and diplomatic fortunes. It arose from two events in the Rhineland. First, in 1685, the Elector Palatine Charles II died. All that remained of his immediate family was Louis's sister-in-law, Elizabeth Charlotte. German law ostensibly barred her from succeeding to her brother's lands and electoral dignity, but it was unclear enough for arguments in favour of Elizabeth Charlotte to have a chance of success. Conversely, the princess was demonstrably entitled to a division of the family's personal property. Louis pressed her claims to land and chattels, hoping the latter, at least, would be given to her. [76] Then, in 1688, Maximilian Henry of Bavaria, Archbishop of Cologne, an ally of France, died. The archbishopric had traditionally been held by the Wittelsbachs of Bavaria, but the Bavarian claimant to replace Maximilian Henry, Prince Joseph Clemens of Bavaria, was at that time not more than 17 years old and not even ordained. Louis sought instead to install his own candidate, Wilhelm Egon von Fürstenberg, to ensure the key Rhenish state remained an ally. [77]\nIn light of his foreign and domestic policies during the early 1680s, which were perceived as aggressive, Louis's actions, fostered by the succession crises of the late 1680s, created concern and alarm in much of Europe. This led to the formation of the 1686 League of Augsburg by the Holy Roman Emperor, Spain, Sweden, Saxony, and Bavaria. Their stated intention was to return France to at least the borders agreed to in the Treaty of Nijmegen. [78] Emperor Leopold I's persistent refusal to convert the Truce of Ratisbon into a permanent treaty fed Louis's fears that the Emperor would turn on France and attack the Reunions after settling his affairs in the Balkans. [79]\nAnother event Louis found threatening was England's Glorious Revolution of 1688. Although King James II was Catholic, his two Anglican daughters, Mary and Anne, ensured the English people a Protestant succession. But when James II's son James Francis Edward Stuart was born, he took precedence in succession over his sisters. This seemed to herald an era of Catholic monarchs in England. Protestant lords called on the Dutch Prince\nBattle of Fleurus, 1690\nLouis in 1690", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Relations with the Dutch\nThe French alliance was deeply unpopular in England, and only more so after the disappointing battles against Michiel de Ruyter's fleet. Charles II of England made peace with the Dutch in the February 1674 Treaty of Westminster. However, French armies held significant advantages over their opponents; an undivided command, talented generals like Turenne, Condé and Luxembourg and vastly superior logistics. Reforms introduced by Louvois, the Secretary of War, helped maintain large field armies that could be mobilised much more quickly, allowing them to mount offensives in early spring before their opponents were ready. [46]\nThe future Philip V being introduced as King of Spain by his grandfather, Louis XIV\nThe French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St Germain for a time, where no one, except a few intimates, was allowed to disturb him. [47] French military advantages allowed them however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual exhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the Scanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of SaintGermain-en-Laye, Fontainebleau and Lund imposed on Denmark-Norway and Brandenburg. [48] Yet Louis's two primary goals, the destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed. [49]\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In 1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too much with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military force alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary treaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his rights and obligations under those treaties.", - "page_start": 6, - "page_end": 7, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Patronage of the arts\nLouis generously supported the royal court of France and those who worked under him. He brought the Académie Française under his patronage and became its \"Protector\". He allowed Classical French literature to flourish by protecting such writers as Molière, Racine, and La Fontaine, whose works remain influential to this day. Louis also patronised the visual arts by funding and commissioning artists such as Charles Le Brun, Pierre Mignard, Antoine Coysevox, and Hyacinthe Rigaud, whose works became\nDual Cypher of King Louis XIV & Queen Marie Thérèse\nPainting from 1667 depicting Louis as patron of the fine arts\nThe Cour royale and the Cour de marbre at Versailles\nfamous throughout Europe. Composers and musicians such as Jean-Baptiste Lully, Jacques Champion de Chambonnières, and François Couperin thrived. In 1661, Louis founded the Académie Royale de Danse, and in 1669, the Académie d'Opéra, important driving events in the evolution of ballet. He also attracted, supported and patronized such artists as André Charles Boulle, who revolutionised marquetry with his art of inlay, today known as \"Boulle work\". Always on the lookout for new talent, the king launched music competitions: in 1683, Michel-Richard de Lalande thus became deputy master of the Royal Chapel, composing his Symphonies for the Soupers du Roy along with 77 large scale Grand Motets .\nOver the course of four building campaigns, Louis converted a hunting lodge commissioned by Louis XIII into the spectacular Palace of Versailles. Except for the current Royal Chapel (built near the end of his reign), the palace achieved much of its current appearance after the third building campaign, which was followed by an official move of the royal court to Versailles on 6 May 1682. Versailles became a dazzling, aweinspiring setting for state affairs and the reception of foreign dignitaries. At Versailles, the king alone commanded attention.\nSeveral reasons have been suggested for the creation of the extravagant and stately palace, as well as the relocation of the monarchy's seat. The memoirist Saint-Simon speculated that Louis viewed Versailles as an isolated power centre where", - "page_start": 15, - "page_end": 16, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Causes and conduct of the war\nWilliam III of Orange, grandson of Charles I of England, to come to their aid. He sailed for England with troops despite Louis's warning that France would regard it as a provocation. Witnessing numerous desertions and defections, even among those closest to him, James II fled England. Parliament declared the throne vacant, and offered it to James's daughter Mary II and his son-inlaw and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus transforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to England to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to the German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises. This military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army of sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation of the Palatinate\"). [80]\nLouis XIV at the siege of Namur (1692)\nFrench armies were generally victorious throughout the war because of Imperial commitments in the Balkans, French logistical superiority, and the quality of French generals such as Condé's famous pupil, François Henri de Montmorency-Bouteville, duc de Luxembourg. [81] He triumphed at the Battles of Fleurus in 1690, Steenkerque in 1692, and Landen in 1693, although, the battles proved to be of little of strategic consequence, [82][83] mostly due to the nature of late 17th-century warfare. [84]", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "What was one of Louis XIV's most ill-famed decrees?", - "target_page": 6, - "target_passage": "One of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Height of power\nBy the early 1680s, Louis had greatly augmented French influence in the world. Domestically, he successfully increased the influence of the crown and its authority over the church and aristocracy, thus consolidating absolute monarchy in France.\nLouis initially supported traditional Gallicanism, which limited papal authority in France, and convened an Assembly of the French clergy in November 1681. Before its dissolution eight months later, the Assembly had accepted the Declaration of the Clergy of France, which increased royal authority at the expense of papal power. Without royal approval, bishops could not leave France, and appeals could not be made to the pope. Additionally, government officials could not be excommunicated for acts committed in pursuance of their duties. Although the king could not make ecclesiastical law, all papal regulations without royal assent were invalid in France. Unsurprisingly, the Pope repudiated the Declaration. [4]\nBy attaching nobles to his court at Versailles, Louis achieved increased control over the French aristocracy. According to historian Philip Mansel, the king turned the palace into:\nan irresistible combination of marriage market, employment agency and entertainment capital of aristocratic Europe, boasting the best theatre, opera, music, gambling, sex and (most important) hunting. [60]\nApartments were built to house those willing to pay court to the king. [61] However, the pensions and privileges necessary to live in a style appropriate to their rank were only possible by waiting constantly on Louis. [62] For this purpose, an elaborate court ritual was created wherein the king became the centre of attention and was observed throughout the day by the public. With his excellent memory, Louis could then see who attended him at court and who was absent, facilitating the subsequent distribution of favours and positions.\nLouis receiving the Doge of Genoa at Versailles on 15 May 1685, following the Bombardment of Genoa. ( Reparation faite à Louis XIV par le Doge de Gênes. 15 mai 1685 by Claude Guy Halle, Versailles.)\nAnother tool Louis used to control his nobility was censorship, which often involved the opening of letters to discern their author's opinion of the government and king. [61] Moreover, by entertaining, impressing, and domesticating them with extravagant luxury and other distractions, Louis not only cultivated public opinion of him, but he also ensured the aristocracy remained under his scrutiny.", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis XIV\nLouis XIV (Louis-Dieudonné; 5 September 1638 - 1 September 1715), also known as Louis the Great ( Louis le Grand ) or the Sun King ( le Roi Soleil ), was King of France from 1643 until his death in 1715. His verified reign of 72 years and 110 days is the longest of any sovereign. [1][a] An emblematic character of the Age of Absolutism in Europe, [3] Louis XIV's legacy is widely characterized by French colonial expansion, the conclusion of Eighty Years' War involving the Habsburgs, and his architectural bequest, marked by commissioned works of art and buildings. His pageantry, opulent lifestyle and ornate cultivated image earned him enduring admiration. Louis XIV raised France to be the exemplar nation-state of the early modern period, and established a cultural prestige which lasted through the subsequent centuries, and continues today.\nLouis began his personal rule of France in 1661, after the death of his chief minister Cardinal Mazarin, when the King famously declared that he would take over the job himself. [4] An adherent of the divine right of kings, Louis continued his predecessors' work of creating a centralised state governed from the capital. He sought to eliminate the remnants of feudalism persisting in parts of France; by compelling many members of the nobility to reside at his lavish Palace of Versailles, he succeeded in pacifying the aristocracy, many of whom had participated in the Fronde rebellions during his minority. He thus became one of the most powerful French monarchs and consolidated a system of absolute monarchy in France that endured until the French Revolution. Louis also enforced uniformity of religion under the Catholic Church. His revocation of the Edict of Nantes abolished the rights of the Huguenot Protestant minority and subjected them to a wave of dragonnades, effectively forcing Huguenots to emigrate or convert, virtually destroying the French Protestant community.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia5.pdf" - }, - { - "text": "See also\nCharles de Lorme, personal medical doctor to Louis XIV\nFundamental laws of the Kingdom of France\nHouse of France\nLevée (ceremony)\nList of French monarchs\nOutline of France\nLouis XIV style\nNicolas Fouquet\nFrench forestry Ordinance of 1669\nPotager du Roi\nÉléphante de Louis XIV", - "page_start": 25, - "page_end": 26, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Reputation\nAlternatively, Louis's critics attribute the social upheaval culminating in the French Revolution to his failure to reform French institutions while the monarchy was still secure. Other scholars counter that there was little reason to reform institutions that largely worked well under Louis. They also maintain that events occurring almost 80 years after his death were not reasonably foreseeable to Louis and that in any case, his successors had sufficient time to initiate reforms of their own. [135]\nLouis has often been criticised for his vanity. The memoirist Saint-Simon, who claimed that Louis slighted him, criticised him thus:\nThere was nothing he liked so much as flattery, or, to put it more plainly, adulation; the coarser and clumsier it was, the more he relished it.\nFor his part, Voltaire saw Louis's vanity as the cause for his bellicosity:\nRoyal procession passing the PontNeuf under Louis XIV\nIt is certain that he passionately wanted glory, rather than the conquests themselves. In the acquisition of Alsace and half of Flanders, and of all of Franche-Comté, what he really liked was the name he made for himself. [136]\nNonetheless, Louis has also received praise. The anti-Bourbon Napoleon described him not only as \"a great king\", but also as \"the only King of France worthy of the name\". [137] Leibniz, the German Protestant philosopher, commended him as \"one of the greatest kings that ever was\". [138] And Lord Acton admired him as \"by far the ablest man who was born in modern times on the steps of a throne\". [139] The historian and philosopher Voltaire wrote: \"His name can never be pronounced without respect and without summoning the image of an eternally memorable age\". [140] Voltaire's history, The Age of Louis XIV , named Louis's reign as not only one of the four great ages in which reason and culture flourished, but the greatest ever. [141][142]", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Further reading\nFélix, Joël. \"'The most difficult financial matter that has ever presented itself': paper money and the financing of warfare under Louis XIV.\" Financial History Review 25.1 (2018): 43-70 online (http://centaur.reading.ac.uk/72452/ 2/The%20most%20difficult%20financial%20matter%20FH.pdf) Archived (https://web.archive.org/web/2021022610 4833/http://centaur.reading.ac.uk/72452/2/The%20most%20difficult%20financial%20matter%20FH.pdf) 26 February 2021 at the Wayback Machine.\nGoubert, Pierre (197). Louis XIV and Twenty Million Frenchmen . social history from Annales School. ISBN 978-03947-1751-7.\nJones, Colin. The Great Nation: France from Louis XIV to Napoleon (1715-1799) (2002)\nKlaits, Joseph. Printed propaganda under Louis XIV: absolute monarchy and public opinion (Princeton University Press, 2015).\nLe Roy Ladurie, Emmanuel. The Ancien Régime: A History of France 1610-1774 (1999), survey by leader of the Annales School ISBN 0631211969\nLewis, W. H. The Splendid Century: Life in the France of Louis XIV (1953) ISBN 0881339210\nMitford, Nancy (1966). The Sun King: Louis XIV at Versailles (2012 ed.). New York Review of Books. ISBN 978-15901-7491-3.\nPrest, Julia, and Guy Rowlands, eds. The Third Reign of Louis XIV, c. 1682-1715 (Taylor & Francis, 2016).\nRothkrug, Lionel. Opposition to Louis XIV: The Political and Social Origins of French Enlightenment (Princeton University Press, 2015).\nRowlands, Guy. The Dynastic State and the Army under Louis XIV: Royal Service and Private Interest, 1661-1701 (2002)\nRubin, David Lee, ed. Sun King: The Ascendancy of French Culture during the Reign of Louis XIV . Washington: Folger Books and Cranbury: Associated University Presses, 1992.\nRule, John C., Louis XIV and the craft of kingship 1969.", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis XIV\nLouis XIV was born on 5 September 1638 in the Château de Saint-Germain-enLaye, to Louis XIII and Anne of Austria. He was named Louis Dieudonné (Louis the God-given) [7] and bore the traditional title of French heirs apparent: Dauphin . [8] At the time of his birth, his parents had been married for 23 years. His mother had experienced four stillbirths between 1619 and 1631. Leading contemporaries thus regarded him as a divine gift and his birth a miracle of God. [9]\nLouis's relationship with his mother was uncommonly affectionate for the time. Contemporaries and eyewitnesses claimed that the Queen would spend all her time with Louis. [10] Both were greatly interested in food and theatre, and it is highly likely that Louis developed these interests through his close relationship with his mother. This long-lasting and loving relationship can be evidenced by excerpts in Louis's journal entries, such as:\n\"Nature was responsible for the first knots which tied me to my mother. But attachments formed later by shared qualities of the spirit are far more difficult to break than those formed merely by blood.\" [11]\nIt was his mother who gave Louis his belief in the absolute and divine power of his monarchical rule. [12]\nDuring his childhood, he was taken care of by the governesses Françoise de Lansac and Marie-Catherine de Senecey. In 1646, Nicolas V de Villeroy became the young king's tutor. Louis XIV became friends with Villeroy's young children, particularly François de Villeroy, and divided his time between the Palais-Royal and the nearby Hotel de Villeroy.", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis XIV\nDuring Louis's long reign, France emerged as the leading European power and regularly made war. A conflict with Spain marked his entire childhood, while during his personal rule, Louis fought three major continental conflicts, each against powerful foreign alliances: the Franco-Dutch War, the Nine Years' War, and the War of the Spanish Succession. In addition, France contested shorter wars such as the War of Devolution and the War of the Reunions. Warfare defined Louis's foreign policy, impelled by his personal ambition for glory and power: \"a mix of commerce, revenge, and pique\". [5] His wars strained France's resources to the utmost, while in peacetime he concentrated on preparing for the next war. He taught his diplomats that their job was to create tactical and strategic advantages for the French military. [6] Upon his death in 1715, Louis XIV left his great-grandson and successor, Louis XV, a powerful but war-weary kingdom, in major debt after the War of the Spanish Succession that had raged on since 1701.\nSome of his other notable achievements include the construction of the Canal du Midi, the patronage of artists, and the founding of the French Academy of Sciences.\nPortrait by Hyacinthe Rigaud , 1701\nKing of France (more...)\nReign\n14 May 1643 - 1 September\n1715\nCoronation\n7 June 1654\nReims Cathedral\nPredecessor\nLouis XIII\nSuccessor\nLouis XV\nRegent\nAnne of Austria (1643-1651)\nChief ministers See list\nCardinal Mazarin (1643-1661)\nJean-Baptiste Colbert (1661-1683)\nThe Marquis of Louvois (1683-1691)\nBorn\n5 September 1638\nChâteau de Saint-Germain- en-Laye, Saint-Germain-en- Laye, France\nDied\n1 September 1715 (aged 76) Palace of Versailles, Versailles, France\nBurial\n9 September 1715 Basilica of Saint-Denis\nSpouses\nMaria Theresa of Spain (m. 1660; died 1683)\nFrançoise d'Aubigné, Marquise de Maintenon (private) (m. 1683)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Reputation\nAccording to Philippe de Courcillon's Journal , Louis on his deathbed advised his heir with these words:\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for vanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the burdens of your subjects. [132]\nSome historians point out that it was a customary demonstration of piety in those days to exaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed declarations in assessing his accomplishments. Rather, they focus on military and diplomatic successes, such as how he placed a French prince on the Spanish throne. This, they contend, ended the threat of an aggressive Spain that historically interfered in domestic French politics. These historians also emphasise the effect of Louis's wars in expanding France's boundaries and creating more defensible frontiers that preserved France from invasion until the Revolution. [132]\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his] subjects.\" For example, he patronised the arts, encouraged industry, fostered trade and commerce, and sponsored the founding of an overseas empire. Moreover, the significant reduction in civil wars and aristocratic rebellions during his reign are seen by these\nTerritorial expansion of France under Louis XIV (1643-1715) is depicted in orange.\nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised France and marked the birth of the modern French state. They regard the political and military victories as well as numerous cultural achievements as how Louis helped raise France to a preeminent position in Europe. [133] Europe came to admire France for its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values, goods, and deportment. French became the universal language of the European elite.\nLouis's detractors have argued that his considerable foreign, military and domestic expenditure impoverished and bankrupted France. His supporters, however, distinguish the state, which was impoverished, from France, which was not. As supporting evidence, they cite the literature of the time, such as the social commentary in Montesquieu's Persian Letters . [134]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Coming of age and early reforms\nThe main weakness arose from an old bargain between the French crown and nobility: the king might raise taxes on the nation without consent if only he exempted the nobility. Only the \"unprivileged\" classes paid direct taxes, which came to mean the peasants only, as most bourgeois finagled exemptions in one way or another. The system laid the whole burden of state expenses on the backs of the poor and powerless. After 1700, with the support of Louis's pious secret wife Madame de Maintenon, the king\nwas persuaded to change his fiscal policy. Though willing enough to tax the nobles, Louis feared the political concessions which they would demand in return. Only towards the close of his reign under the extreme exigency of war, was he able, for the first time in French history, to impose direct taxes on the aristocracy. This was a step toward equality before the law and toward sound public finance, though it was predictably diminished by concessions and exemptions won by the insistent efforts of nobles and bourgeois. [35]\nLouis and Colbert also had wide-ranging plans to grow French commerce and trade. Colbert's mercantilist administration established new industries and encouraged manufacturers and inventors, such as the Lyon silk manufacturers and the Gobelins tapestry manufactory. He invited manufacturers and artisans from all over Europe to France, such as Murano glassmakers, Swedish ironworkers, and Dutch shipbuilders. He aimed to decrease imports while increasing French exports, hence reducing the net outflow of precious metals from France.\nEngraving of Louis XIV\nLouis instituted reforms in military administration through Michel le Tellier and his son François-Michel le Tellier, successive Marquis de Louvois. They helped to curb the independent spirit of the nobility, imposing order on them at court and in the army. Gone were the days when generals protracted war at the frontiers while bickering over precedence and ignoring orders from the capital and the larger strategic picture, with the old military aristocracy ( noblesse d'épée , nobility of the sword) monopolizing senior military positions and the higher ranks. Louvois modernized the army and reorganised it into a professional, disciplined, well-trained force. He was devoted to the soldiers' material well-being and morale, and even tried to direct campaigns.", - "page_start": 4, - "page_end": 5, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Coming of age and early reforms\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of Mazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring that he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government of my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] will assist me with your counsels when I ask for them. I request and order you to seal no orders except by my command . . . I order you not to sign anything, not even a passport . . . without my command; to render account to me personally each day and to favor no one\". [33] Capitalizing on the widespread public yearning for peace and order after decades of foreign and civil strife, the young king consolidated central political authority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, the historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of Louis\". [34]\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on bankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in 1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. Although Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's after him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le-\nRoyal Monogram\nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds.\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the remote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the Parlement found him guilty and sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "What did Louis XIV do to avoid the Spanish War of Succession in 1698?", - "target_page": 13, - "target_passage": "In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand.", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Louis XIV\nDuring Louis's long reign, France emerged as the leading European power and regularly made war. A conflict with Spain marked his entire childhood, while during his personal rule, Louis fought three major continental conflicts, each against powerful foreign alliances: the Franco-Dutch War, the Nine Years' War, and the War of the Spanish Succession. In addition, France contested shorter wars such as the War of Devolution and the War of the Reunions. Warfare defined Louis's foreign policy, impelled by his personal ambition for glory and power: \"a mix of commerce, revenge, and pique\". [5] His wars strained France's resources to the utmost, while in peacetime he concentrated on preparing for the next war. He taught his diplomats that their job was to create tactical and strategic advantages for the French military. [6] Upon his death in 1715, Louis XIV left his great-grandson and successor, Louis XV, a powerful but war-weary kingdom, in major debt after the War of the Spanish Succession that had raged on since 1701.\nSome of his other notable achievements include the construction of the Canal du Midi, the patronage of artists, and the founding of the French Academy of Sciences.\nPortrait by Hyacinthe Rigaud , 1701\nKing of France (more...)\nReign\n14 May 1643 - 1 September\n1715\nCoronation\n7 June 1654\nReims Cathedral\nPredecessor\nLouis XIII\nSuccessor\nLouis XV\nRegent\nAnne of Austria (1643-1651)\nChief ministers See list\nCardinal Mazarin (1643-1661)\nJean-Baptiste Colbert (1661-1683)\nThe Marquis of Louvois (1683-1691)\nBorn\n5 September 1638\nChâteau de Saint-Germain- en-Laye, Saint-Germain-en- Laye, France\nDied\n1 September 1715 (aged 76) Palace of Versailles, Versailles, France\nBurial\n9 September 1715 Basilica of Saint-Denis\nSpouses\nMaria Theresa of Spain (m. 1660; died 1683)\nFrançoise d'Aubigné, Marquise de Maintenon (private) (m. 1683)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Line of succession in 1715\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson, Philip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish Succession, which lasted for 13 years after the death of Charles II of Spain in 1700. [131]\nLouis XIII (1601-1643)\nFurther down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of the House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin of French King Louis XIII (the father of Louis XIV) in the male line.", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Causes and conduct of the war\nAlthough an attempt to restore James II failed at the Battle of the Boyne in 1690, France accumulated a string of victories from Flanders in the north, Germany in the east, and Italy and Spain in the south, to the high seas and the colonies. Louis personally supervised the captures of Mons in 1691 and Namur in 1692. Luxembourg gave France the defensive line of the Sambre by capturing Charleroi in 1693. France also overran most of the Duchy of Savoy after the battles of Marsaglia and Staffarde in 1693. While naval stalemate ensued after the French victory at the Battle of Beachy Head in 1690 and the Allied victory at Barfleur-La Hougue in 1692, the Battle of Torroella in 1694 exposed Catalonia to French invasion, culminating in the capture of Barcelona.\nThe Dutch captured Pondichéry in 1693, but a 1697 French raid on the Spanish treasure port of Cartagena, Spain, yielded a fortune of 10,000,000 livres.\nIn July 1695, the city of Namur, occupied for three years by the French, was besieged by an allied army led by William III. Louis XIV ordered the surprise destruction of a Flemish city to divert the attention of these troops. This led to the bombardment of Brussels, in which more than 4,000 buildings were destroyed, including the entire city centre. The strategy failed, as Namur fell three weeks later, but harmed Louis XIV's reputation: a century later, Napoleon deemed the bombardment \"as barbarous as it was useless\". [85]\nPeace was broached by Sweden in 1690. By 1692, both sides evidently wanted peace, and secret bilateral talks began, but to no avail. [86] Louis tried to break up the alliance against him by dealing with individual opponents but did not achieve his aim until 1696 when the Savoyards agreed to the Treaty of Turin and switched sides. Thereafter, members of the League of Augsburg rushed to the peace table, and negotiations for a general peace began in earnest, culminating in the Peace of Ryswick of 1697. [87]\nMarshal de Luxembourg", - "page_start": 11, - "page_end": 12, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Acceptance of the will of Charles II and consequences\nMost European rulers accepted Philip as king, some reluctantly. Depending on one's views of the war's inevitability, Louis acted reasonably or arrogantly. [95] He confirmed that Philip V retained his French rights despite his new Spanish position. Admittedly, he may only have been hypothesising a theoretical eventuality and not attempting a Franco-Spanish union. But his actions were certainly not read as disinterested. Moreover, Louis sent troops to the Spanish Netherlands to evict Dutch garrisons and secure Dutch recognition of Philip V. In 1701, Philip transferred the asiento (the right to supply slaves to Spanish colonies) to France, as a sign of the two nations' growing connections. As tensions mounted, Louis decided to acknowledge James Stuart, the son of James II, as King of England, Scotland and Ireland on the latter's death, infuriating William III. These actions enraged Britain and the Dutch Republic. [96] With the Holy Roman Emperor and the petty German states, they formed another Grand Alliance and declared war on France in 1702. French diplomacy secured Bavaria, Portugal, and Savoy as Franco-Spanish allies. [97]", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Relations with the Dutch\nThe French alliance was deeply unpopular in England, and only more so after the disappointing battles against Michiel de Ruyter's fleet. Charles II of England made peace with the Dutch in the February 1674 Treaty of Westminster. However, French armies held significant advantages over their opponents; an undivided command, talented generals like Turenne, Condé and Luxembourg and vastly superior logistics. Reforms introduced by Louvois, the Secretary of War, helped maintain large field armies that could be mobilised much more quickly, allowing them to mount offensives in early spring before their opponents were ready. [46]\nThe future Philip V being introduced as King of Spain by his grandfather, Louis XIV\nThe French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St Germain for a time, where no one, except a few intimates, was allowed to disturb him. [47] French military advantages allowed them however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual exhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the Scanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of SaintGermain-en-Laye, Fontainebleau and Lund imposed on Denmark-Norway and Brandenburg. [48] Yet Louis's two primary goals, the destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed. [49]\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In 1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too much with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military force alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary treaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his rights and obligations under those treaties.", - "page_start": 6, - "page_end": 7, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Acceptance of the will of Charles II and consequences\nOn his deathbed in 1700, Charles II of Spain unexpectedly changed his will. The clear demonstration of French military superiority for many decades before this time, the pro-French faction at the court of Spain, and even Pope\nInnocent XII convinced him that France was more likely to preserve his empire intact. He thus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided it remained undivided. Anjou was not in the direct line of French succession, thus his accession would not cause a Franco-Spanish union. [92] If Anjou refused, the throne would be offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it, it would go to Archduke Charles, then to the distantly related House of Savoy if Charles declined it. [93]\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish possessions and avoid a general war, or accept Charles II's will and alienate much of Europe. He may initially have been inclined to abide by the partition treaties, but the Dauphin's insistence persuaded him otherwise. [94] Moreover, Louis's foreign minister, Jean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would almost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He emphasised that, should it come to war, William III was unlikely to stand by France since\nLouis in 1701\nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\". [91] Indeed, in the event of war, it might be preferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip, Duke of Anjou, thus became Philip V, King of Spain.", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia5.pdf" - }, - { - "text": "France as the pivot of warfare\nUnder Louis, France was the leading European power, and most wars pivoted around its aggressiveness. No European state exceeded it in population, and no one could match its wealth, central location, and very strong professional army. It had largely avoided the devastation of the Thirty Years' War. Its weaknesses included an inefficient financial system that was hard-pressed to pay for its military adventures, and the tendency of most other powers to gang up against it.\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine Years' War, and the War of the Spanish Succession. There were also two lesser conflicts: the War of Devolution and the War of the Reunions. [64] The wars were very expensive but defined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by a mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to enhance his glory. In peacetime, he concentrated on preparing for the next war. He taught his diplomats that their job was to create tactical and strategic advantages for the French military. [6] By 1695, France retained much of its dominance but had lost control of the seas to England and Holland, and most countries, both Protestant and Catholic, were in alliance against it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned Louis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that France fight back by licensing French merchant ships to privateer and seize enemy merchant ships while avoiding its navies:\nLouis XIV\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in Europe, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies in the East and West Indies; and Holland with all its possessions in the four corners of the world where it has great establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness, Denmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states secretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting and covering their trade. [65]\nVauban was pessimistic about France's so-called friends and allies:", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis XIV\nLouis XIV (Louis-Dieudonné; 5 September 1638 - 1 September 1715), also known as Louis the Great ( Louis le Grand ) or the Sun King ( le Roi Soleil ), was King of France from 1643 until his death in 1715. His verified reign of 72 years and 110 days is the longest of any sovereign. [1][a] An emblematic character of the Age of Absolutism in Europe, [3] Louis XIV's legacy is widely characterized by French colonial expansion, the conclusion of Eighty Years' War involving the Habsburgs, and his architectural bequest, marked by commissioned works of art and buildings. His pageantry, opulent lifestyle and ornate cultivated image earned him enduring admiration. Louis XIV raised France to be the exemplar nation-state of the early modern period, and established a cultural prestige which lasted through the subsequent centuries, and continues today.\nLouis began his personal rule of France in 1661, after the death of his chief minister Cardinal Mazarin, when the King famously declared that he would take over the job himself. [4] An adherent of the divine right of kings, Louis continued his predecessors' work of creating a centralised state governed from the capital. He sought to eliminate the remnants of feudalism persisting in parts of France; by compelling many members of the nobility to reside at his lavish Palace of Versailles, he succeeded in pacifying the aristocracy, many of whom had participated in the Fronde rebellions during his minority. He thus became one of the most powerful French monarchs and consolidated a system of absolute monarchy in France that endured until the French Revolution. Louis also enforced uniformity of religion under the Catholic Church. His revocation of the Edict of Nantes abolished the rights of the Huguenot Protestant minority and subjected them to a wave of dragonnades, effectively forcing Huguenots to emigrate or convert, virtually destroying the French Protestant community.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Causes and conduct of the war\nWilliam III of Orange, grandson of Charles I of England, to come to their aid. He sailed for England with troops despite Louis's warning that France would regard it as a provocation. Witnessing numerous desertions and defections, even among those closest to him, James II fled England. Parliament declared the throne vacant, and offered it to James's daughter Mary II and his son-inlaw and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus transforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to England to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to the German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises. This military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army of sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation of the Palatinate\"). [80]\nLouis XIV at the siege of Namur (1692)\nFrench armies were generally victorious throughout the war because of Imperial commitments in the Balkans, French logistical superiority, and the quality of French generals such as Condé's famous pupil, François Henri de Montmorency-Bouteville, duc de Luxembourg. [81] He triumphed at the Battles of Fleurus in 1690, Steenkerque in 1692, and Landen in 1693, although, the battles proved to be of little of strategic consequence, [82][83] mostly due to the nature of late 17th-century warfare. [84]", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Causes and build-up to the war\nBy the time of the Peace of Ryswick, the Spanish succession had been a source of concern to European leaders for well over forty years. King Charles II ruled a vast empire comprising Spain, Naples, Sicily, Milan, the Spanish Netherlands, and numerous Spanish colonies. He produced no children, however, and consequently had no direct heirs.\nThe principal claimants to the throne of Spain belonged to the ruling families of France and Austria. The French claim derived from Louis XIV's mother Anne of Austria (the older sister of Philip IV of Spain) and his wife Maria Theresa (Philip IV's eldest daughter). Based on the laws of primogeniture, France had the better claim as it originated from the eldest daughters in two generations. However, their renunciation of succession rights complicated matters. In the case of Maria Theresa, nonetheless, the renunciation was considered null and void owing to Spain's breach of her marriage contract with Louis. In contrast, no renunciations tainted the claims of Emperor Leopold I's son Charles, Archduke of Austria, who was a grandson of Philip III's youngest daughter Maria Anna. The English and Dutch feared that a French or Austrian-born Spanish king would threaten the balance of power and thus preferred the Bavarian Prince Joseph Ferdinand, a grandson of Leopold I through his first wife Margaret Theresa of Spain (the younger daughter of Philip IV).\nIn an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand. William III consented to permitting the Dauphin's new territories to become part of France when the latter\nPhilip V of Spain\nsucceeded to his father's throne. [90] The signatories, however, omitted to consult the ruler of these lands, and Charles II was passionately opposed to the dismemberment of his empire. In 1699, he re-confirmed his 1693 will that named Joseph Ferdinand as his sole successor. [91]", - "page_start": 12, - "page_end": 13, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "Does nerve transection or crushing affect small afferents within the dorsal root ganglion in the same way?", - "target_page": 5, - "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "4.3. Implications for pain pathogenesis\nThere are many anatomical sites within the somatosensory nervous system where differential loss of sensory neuron populations could impact neurobiology. For example, loss of cutaneous afferents may afford more opportunity for plasticity in reinnervation patterns, such as collateral sprouting of uninjured or surviving afferents, and the types of nerve endings made by different molecular subpopulations. 17,27 It also seems likely that the death of many neurons within a DRG could contribute to the expansion and activation of immune cell types, which are known to play a major role in neuropathic pain. 30,69 Finally, under normal conditions, peripheral sensory input is integrated into the dorsal horn of the spinal cord by complex interneuron circuitry. Many spinal circuits are engaged by convergent input from different afferent types. 9,41,70 Therefore, selective loss of input from discrete afferent types could undoubtedly impact the normal processing of remaining afferent signals. 34 Experimentally abrogating neuronal loss may be a fruitful approach to assess the contribution to nervous system plasticity (adaptive or maladaptive) following injury. In this regard, our in vitro readout would be a useful experimental\nPAIN ®\nplatform to help delineate the precise cell death pathways and signaling cascades engaged (which could then be experimentally manipulated). Such studies should consider that plasticity may evolve over time. The loss of IB4 1 central terminals is transient following crush and has even been observed to reverse at longer timepoints following SNItrans. 36 These observations, in conjunction with ours of loss of neurons, raise the intriguing question of the source of such central reinnervation.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nobserved 7809 6 153 neurons per DRG; this was not significantly different to the number of neurons in the contralateral DRG (7917 6 349), whereas cell number approximately halved by 8 weeks postinjury to 3963 6 410 neurons per DRG ( Fig. 1C ). Separating analysis into intact vs axotomized afferents revealed that only axotomized afferents were lost, with no difference observed in numbers of intact afferents ( Fig. 1D ). Between 1 and 8 weeks after injury, we observed a 61.0 6 7.0% decrease in the number of GFP 1 neurons. This loss of injured afferents resulted in a loss of neuron-containing (ie, excluding white matter regions) DRG volume ( Fig. 1E ), but not neuron density ( Fig. 1F ). Cell loss predominantly occurred between 1 and 2 weeks postinjury and stabilized after this timepoint. Population distributions of the cross-sectional area of nucleated, tdTomato-expressing cell profiles were not significantly different at 1 vs 8 weeks postSNItrans, in contrast to GFP-expressing/injured afferents, in which a loss of a population of small afferents at 8 weeks postinjury was observed ( Fig. 1G ).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nSNItrans resulted in a mixed population of axotomized and intact afferents within the L4 DRG. Therefore, we developed an approach to restrict our analysis to axotomized afferents, without relying on transgenic labelling, and used this as a complementary approach to confirm our findings. We injected the neuronal tracer FB into the glabrous, tibial innervation territory of both hindpaws 1 week before common peroneal and tibial transection (SNItrans) or crush (SNIcrush) surgeries ( Figs. 2A and B ). FastBlue-uptake was complete across neurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ C84), so this approach allowed us to profile a sample of the axotomized afferents. Both SNItrans ( Fig. 2C ) and SNIcrush ( Fig. 2D ) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post-nerve injury.\nAs a third complementary approach, we applied semiautomated volumetric analyses of nuclei size following tissue clearing. In this study, whole DRGs were cleared 4 weeks after SNItrans for nuclei counting in 'complete' tissue ( Figs. 2E-H ). Nuclei were labelled by TDP-43, in line with the study by West et al., 67 and were quantified using Imaris software ( Fig. 2F , Video 1). We observed a slight but significant rightward shift in nuclear spot volume population distribution 4 weeks after SNItrans ( Fig. 2G ). In addition, there was a significant reduction in the number of small but not medium or large nuclear spots, in support of a loss of small-diameter neuron populations ( Fig. 2H ).\nTogether, our data derived from several different experimental approaches show that a population of small-diameter afferents are lost following peripheral nerve injury.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "References\n[65] West CA, Davies KA, Hart AM, Wiberg M, Williams SR, Terenghi G. Volumetric magnetic resonance imaging of dorsal root ganglia for the objective quantitative assessment of neuron death after peripheral nerve injury. Exp Neurol 2007;203:22-33.\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after upper limb nerve injury and protective effect of repair: clinical evaluation using volumetric magnetic resonance imaging of dorsal root ganglia. Neurosurgery 2013;73:632-40.\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological automated analysis of biological structures. bioRxiv 2020:648337.\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in dorsal root ganglion neurons following peripheral nerve injury. Neuroreport 2018;29:779-85.\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum AI. Dorsal root ganglion macrophages contribute to both the initiation and persistence of neuropathic pain. Nat Commun 2020;11:264.\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia gelatinosa mediate interaction of signals from primary afferents. J Physiol 2010;588:2065-75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury-induced plasticity and pain.\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "1. Introduction\nnerve injury in experimental rodent models. 24,50,53,56 Some studies have suggested that neuron loss occurs in certain patient cohorts, 48,66 but this is yet to be definitively demonstrated in humans. In rodents, most studies support a preferential loss of small cells that give rise to unmyelinated fibers 53 but some contrasting studies describe the preferential loss of large cells 6 or loss of cells of all sizes. 46 Variation is evident across studies in terms of experimental species, age, type of injury, and quantification methods. 56 Shi et al. 50 used stereological counting methods to identify a 54% loss of DRG neuron number 4 weeks after 'mid-thigh' sciatic nerve transection in C57BL/6 mice. Estimates for the degree of loss following commonly used nerve injury paradigms (eg, spared nerve injury [SNI] and sciatic nerve crush) are not available and because of the neurochemical changes following injury and the loss of subpopulation marker gene expression, 5,44,50 the vulnerability of molecularly defined subpopulations has not been characterized. Moreover, more recent studies have cast doubt on the extent or even presence of DRG neuron death following nerve injury. One study which developed a deep learning approach to assess rat DRG cellular plasticity found no loss of neurons up to 2 weeks post-SNI, 49 while another observed no loss of genetically labelled damaged DRG neurons 2 months after sciatic nerve crush. 44\nThe issue of whether neuron loss occurs, and if so, in what subpopulations, is important. It will likely have implications for our understanding of reinnervation and functional recovery in patients. Furthermore, better insight will provide critical context for those investigating the plasticity that occurs following nerve injury and may inform therapeutic targeting of sensory neuron populations.\nAn expanding repertoire of transgenic recombinase driver lines now makes it possible to permanently label DRG neuron subpopulations and study their fate in rodent nerve injury paradigms. The aim of this study was to use this technology to characterize\nwww.painjournalonline.com\n2863\n2864\nA.H. Cooper et al. · 165 (2024) 2863-2876\nneuron loss after nerve injury and to test the hypothesis that loss is not equally distributed across molecular populations.", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nP , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green fluorescent protein.\nprotein) neurons 28 days after sham surgery or SNItrans ( Figs. 3A and B ). SNItrans, but not sham, resulted in a significant decrease (54.0 6 6.6%) in the total number of MrgD-YFP 1 neurons in L4 DRG ( Fig. 3C ).\nYellow fluorescent protein expression in MrgD ChR2-YFP mice is driven by the endogenous Mrgprd promotor, which has been reported to be upregulated or downregulated following axonal damage. 44,58 Such changes in promoter activity could affect the proportion of nonpeptidergic nociceptors identified by YFP expression. Therefore, to verify these findings, we used MrgD CreERT2 ;Ai32 mice and tamoxifen administration before injury, to permanently label Mrgprdexpressing afferents with ChR2-YFP ( Figs. 3D-F ). We then tested whether the proportion of cutaneous tibial afferents that were YFP 1 was altered following nerve injury. Following hindpaw FB injection, ; 15% of contralateral, FB-labelled DRG neurons expressed YFP. This was reduced to 6.0 6 1.2% 28 days after SNIcrush injury and to only 1.7 6 0.9%", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "4.3. Implications for pain pathogenesis\nNeuronal loss has been proposed as a key contributor to poor functional recovery following nerve injury, 54 and biased survival of different afferent types might be expected to contribute to modality-specific sensory deficits. Beyond loss of function, does DRGneuronlosscontribute to chronic pain, in either an adaptive or maladaptive manner? Intrathecal delivery of GDNF is neuroprotective and reverses the reduction in the number of IB4-binding DRG neurons and central terminals seen following transection. 5 Treatment is concurrently analgesic and abrogates pain-related behaviors. 7,60 However, the pleiotropic nature of GDNF makes it impossible to directly attribute the analgesic effects to the reversal of neuron loss. Indeed, it is possible that GDNF exerts its effect by actions on intact nonpeptidergic nociceptive afferents, 52 activation of which is known to drive aversive behaviors in the neuropathic state. 62 These data leave the contribution of nonpeptidergic nociceptor loss to behavior in the GDNF treatment paradigm ambiguous. Other pharmacological approaches have been found effective at reversing a neuronal loss in rodent models, but the impact on pain behavior was not studied. 21,22\nRodents develop marked mechanical and thermal hypersensitivity rapidly following nerve injury and before timepoints at which neuron loss is observed. 10 This lack of a temporal correlation may suggest a limited contribution to evoked hypersensitivities. The temporal profile of ongoing tonic pain (eg, pain aversiveness as measured by condition place preference assays 26 ) is less defined and so is its correlation to the timing of neuron loss.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nby a population of small-diameter, putative cold-sensitive neurons ( Fig. 4B ), accounting for 8.3 6 0.27% of FB-labelled neurons in contralateral DRG. This decreased to 4.2 6 0.96% ipsilateral to SNItrans injury ( Fig. 4E ), indicating a partial loss of Trpm8 1 afferents. When examining peptidergic afferents, we found that 48.1 6 2.42% of FB-labelled neurons in contralateral DRG were Calca-YFP 1 , compared with 34.3 6 2.54% 4 weeks after SNItrans injury ( Figs. 4C and F ), consistent with a partial loss of CGRP 1 afferents. We used a Thy1-CFP line that demonstrates consistent expression postinjury 61 and labels a sample of medium/large diameter myelinated afferents. CFP was largely restricted to NF200 1 neurons, labelling 56% of this population.\nExpression was present in a heterogenous population of nociceptive (TrkA 1 ) and nonnociceptive (TrkA-) myelinated neurons (Fig. S5, http://links.lww.com/PAIN/C84). Contralateral to injury, 15.6 6 1.8% of FB-labelled neurons expressed Thy1CFP ( Figs. 4D and G ). In contrast to unmyelinated subpopulations, this proportion was higher in ipsilateral DRG following SNItrans (23.3 6 3.2%), consistent with no (or minimal) loss of Thy1-CFP-expressing afferents, accompanied by a loss of Thy1CFP-negative neurons. We did not observe significant alterations in the population distributions of the cross-sectional area of surviving, damaged Trpm8-tdTom 1 , Calca-YFP 1 , or Thy1CFP 1 DRG neurons when compared with DRG contralateral to\nwww.painjournalonline.com\n2871\n2872\nA.H. Cooper et al. · 165 (2024) 2863-2876", - "page_start": 8, - "page_end": 9, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nTo date, determining cell loss among specific populations of afferent neurons has proved challenging due to the downregulation of subpopulation-specific marker genes following axonal transection. 37,44 To overcome this issue, we took advantage of transgenic strategies to label populations in a manner that persisted after injury. Owing to the bias for the loss of small neurons and the known loss of IB4-binding central terminals postinjury, 36 we initially focused on nonpeptidergic nociceptive neurons. We used MrgD ChR2-YFP mice to identify neurons belonging to the largest of the 3 classes of nonpeptidergic nociceptors, NP1. 55,59 To determine whether these neurons are lost following nerve injury, we used a stereological method to quantify L4 DRG MrgD-YFP 1 (yellow fluorescent\n2868\nA.H. Cooper et al. · 165 (2024) 2863-2876\nPAIN ®", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "What are the EU's key nature conservation commitments for 2030?", - "target_page": 6, - "target_passage": "1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Nature protection: key commitments by 2030\n1. Legally protect a minimum of 30% of the EU's land area and 30% of the EU's sea area and integrate ecological corridors, as part of a true Trans-European Nature Network.\n2. Strictly protect at least a third of the EU's protected areas, including all remaining EU primary and old-growth forests.\n3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.\n27 Guidance on a strategic framework for further supporting the deployment of EU-level green and blue infrastructure (SWD(2019) 193).\n5", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "4.1. Raising the level of ambition and commitment worldwide\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global efforts under the United Nations Convention on Biological Diversity have largely been insufficient. Nature cannot afford any half measures or lack of ambition.\nIn this spirit, the EU is ready to lead all efforts - working with like-minded partners in a high-ambition coalition on biodiversity - to agree an ambitious new global framework for post-2020 at the upcoming 15 th Conference of the Parties to the Convention on Biological Diversity.\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring to the table. The EU should also support governments and stakeholders across the globe to significantly step up their ambition and their action.\nThe Commission proposes that the EU ensures that the post-2020 global framework includes, at a minimum, the elements outlined below:\n Overarching global goals for biodiversity for 2050, in line with the United Nations 2030 Agenda for Sustainable Development and the vision of 'living in harmony with nature'. The ambition should be that, by 2050, all of the world's ecosystems are restored, resilient, and adequately protected. The world should commit to the net-gain principle to give nature back more than it takes. The world should commit to no human-induced extinction of species, at minimum where avoidable.\n Ambitious global 2030 targets in line with EU commitments in this strategy. These should clearly address the drivers of biodiversity loss and be specific, measurable, actionable, relevant and time-bound.\n A much stronger implementation, monitoring and review process. Parties should revise their National Biodiversity Strategies and Action Plans by the end of 2021, or as a minimum, submit national commitments for the most important targets. There should be a regular review cycle to look at progress towards the\n76 Green alliances focus on cooperation with African and other partners to implement the European Green Deal.\n19\ntargets, with the ability to ratchet up action if needed. These reviews should be based on an independent, science-based gap-analysis and foresight process, with common headline indicators for all Parties.", - "page_start": 19, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "4.2.3. International cooperation, neighbourhood policy and resource mobilisation\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to double financial flows to developing countries for biodiversity 82 . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle.\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)).\n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the World's Forests (COM(2019) 352).\n82 Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.\n21\npolicies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries practices and actions to protect and restore the world's forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the One Health approach 83 , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the NaturAfrica initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.", - "page_start": 21, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "1. BIODIVERSITY - THE NEED FOR URGENT ACTION\n7 Food and Agriculture Organization (2019), State of the World's Biodiversity for Food and Agriculture.\n8 IPBES (2019), Summary for policymakers, p. 3, A1.\n9 IPBES (2019), Summary for policymakers, pp. 17-19, B.10-B.14; European Environment Agency (2019), The European environment - state and outlook 2020.\n10 World Wildlife Fund (2018), Living Planet Report - 2018: Aiming Higher.\n11 IPBES (2019), Summary for policymakers, p. 4, A4.\n12 Idem.\n13 https://ec.europa.eu/research/environment/index.cfm?pg=nbs\n14 World Economic Forum (2020), The Global Risks Report 2020.\n15 Organisation for Economic Co-operation and Development (OECD) (2019), Biodiversity: Finance and the Economic and Business Case for Action.\n16 Idem.\n2\nbuild on the headline ambition to ensure that by 2050 all of the world's ecosystems are restored, resilient, and adequately protected. The world should commit to the net-gain principle to give nature back more than it takes. As part of this, the world should commit to no human-induced extinction of species, at minimum where avoidable.\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to ensure that Europe's biodiversity will be on the path to recovery by 2030 for the benefit of people, the planet, the climate and our economy, in line with the 2030 Agenda for Sustainable Development and with the objectives of the Paris Agreement on Climate Change. It addresses the five main drivers of biodiversity loss, sets out an enhanced governance framework to fill remaining gaps, ensures the full implementation of EU legislation, and pulls together all existing efforts. This strategy is enterprising and incentivising in spirit and action. It reflects the fact that protecting and restoring nature will need more than regulation alone . It will require action by citizens, businesses, social partners and the research and knowledge community, as well as strong partnerships between local, regional, national and European level. This strategy is in line with the ambitions and commitment set out in President von der Leyen's Political Guidelines and in the European Green Deal.", - "page_start": 2, - "page_end": 3, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "2.2.1. Strengthening the EU legal framework for nature restoration\nNature restoration is already partially required from the Member States in existing EU legislation 28 . However, significant implementation and regulatory gaps hinder progress . For instance, there is no requirement for Member States to have biodiversity restoration plans. There are not always clear or binding targets and timelines and no definition or criteria on restoration or on the sustainable use of ecosystems. There is also no requirement to comprehensively map, monitor or assess ecosystem services, health or restoration efforts. These issues are exacerbated by the gaps in implementation that prevent the existing legislation from achieving its objectives 29 . Stronger implementation support and enforcement is required. To ensure that nature restoration across land and sea picks up, increases the EU's resilience, and contributes to climate change mitigation and adaptation as a key nature-based solution, this strategy puts forward two strands of actions:\n Firstly, and subject to an impact assessment, the Commission will put forward a proposal for legally binding EU nature restoration targets in 2021 to restore degraded ecosystems, in particular those with the most potential to capture and store carbon and to prevent and reduce the impact of natural disasters. This will identify the conditions in which the targets must be met, as well as the most effective measures to reach them. The impact assessment will also look at the possibility of an EU-wide methodology to map, assess and achieve good condition of ecosystems so they can deliver benefits such as climate regulation, water regulation, soil health, pollination and disaster prevention and protection.\n In that context, the Commission will request and support Member States to raise the level of implementation of existing legislation within clear deadlines. It will in particular request Member States to ensure no deterioration in conservation trends and status of all protected habitats and species by 2030 30 . In addition, Member States will have to ensure that at least 30% of species and habitats not\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework Directive (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive (2008/56/EC).\n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water Legislation (SWD(2019) 439). See also below, Section 3.2.\n30 Habitats and species listed under the Birds and Habitats Directives.\n6", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "2.1. A coherent network of protected areas\nStates and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. Every Member State will have to do its fair share of the effort based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical marine and terrestrial ecosystems in the EU's outermost regions given their exceptionally high biodiversity value.\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up ecological corridors to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure 27 and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\nFinally, the Overseas Countries and Territories also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "3.3.1. Business for biodiversity\nIn the partnership spirit of this strategy, all parts of the economy and society will have to play their role. Industry and business have an impact on nature, but they also produce the important innovations, partnerships and expertise that can help address biodiversity loss.\nTo ensure environmental and social interests are fully embedded into business strategies, the Commission will put forward a new initiative in 2021 on sustainable corporate governance . This initiative, which may take the form of a legislative proposal, will address human rights and environmental duty of care and due diligence across economic value chains in a proportionate way according to different sizes of entreprises 64 . This will help ensure that shareholder and stakeholder interests are fully aligned with the objectives set out in this strategy. In addition, in 2020, the Commission launched a review of the reporting obligations of businesses under the Non-Financial Reporting Directive 65 , with a view to improving the quality and scope of non-financial disclosures, including on environmental aspects such as biodiversity.\nThrough its existing platforms 66 , the Commission will help to build a European Business for Biodiversity movement, taking inspiration from recent initiatives 67 and making this movement an integral part of the European Climate Pact. Particular attention will be paid to measures to incentivise and eliminate barriers for the take-up of naturebased solutions, as these can lead to significant business and employment opportunities in various sectors 68 and are the key to innovation for economic or societal needs that rely on nature.\n62 Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental Assessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime (2008/99/EC).\n63 https://ec.europa.eu/environment/aarhus/\n64 Study on due diligence requirements through the supply chain - Final Report.\n65 Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and diversity information by certain large undertakings.\n66 Such as the EU Business @ Biodiversity Platform (B@B).\n67 See for example Business for Nature or One Planet Business for Biodiversity.\n68 BenDor et al. (2015), Estimating the Size and Impact of the Ecological Restoration Economy.\n16", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "EU Nature Restoration Plan: key commitments by 2030\n1. Legally binding EU nature restoration targets to be proposed in 2021, subject to an impact assessment. By 2030, significant areas of degraded and carbon-rich ecosystems are restored; habitats and species show no deterioration in conservation trends and status; and at least 30% reach favourable conservation status or at least show a positive trend.\n2. The decline in pollinators is reversed.\n3. The risk and use of chemical pesticides is reduced by 50% and the use of more hazardous pesticides is reduced by 50%.\n4. At least 10% of agricultural area is under high-diversity landscape features.\n5. At least 25% of agricultural land is under organic farming management, and the uptake of agro-ecological practices is significantly increased.\n6. Three billion new trees are planted in the EU, in full respect of ecological principles.\n7. Significant progress has been made in the remediation of contaminated soil sites.\n8. At least 25,000 km of free-flowing rivers are restored.\n54 Sustainable Use of Pesticides Directive (2009/128/EC).\n55 European Strategy for Plastics in a Circular Economy (COM(2018) 28).\n56 A new Circular Economy Action Plan for a cleaner and more competitive Europe (COM(2020) 98).\n57 See for example: Hulme P. (2014). Invasive species challenge the global response to emerging diseases, Trends in parasitology (2014) Vol. 30, Issue 6 ; Duscher et al. (2017).\n58 Regulation (EU) 1143/2014 on invasive alien species.\n59 Red List of the International Union for the Conservation of Nature (IUCN).\n14\n9. There is a 50% reduction in the number of Red List species threatened by invasive alien species.\n10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction ofthe use of fertilisers by at least 20%.\n11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan.\n12. No chemical pesticides are used in sensitive areas such as EU urban green areas.\n13. The negative impacts on sensitive species and habitats, including on the seabed through fishing and extraction activities, are substantially reduced to achieve good environmental status.\n14. The by-catch of species is eliminated or reduced to a level that allows species recovery and conservation.", - "page_start": 14, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "3.3.2. Investments, pricing and taxation\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget.\n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States' Prioritised Action Frameworks under the Habitats Directive.\n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds.\n72 See EU taxonomy for sustainable activities.\n73 World Wildlife Fund (2019), The Nature of Risk - A Framework for Understanding Nature-Related Risk to Business.\n17\nlegislation and guidance on green public procurement , the Commission will integrate criteria and monitoring to boost nature-based solutions.", - "page_start": 17, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "5. CONCLUSION\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 th Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n83 https://www.who.int/features/qa/one-health/en/\n22", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "Was there a biodiversity governance framework in place in the EU before the European Commission's proposal?", - "target_page": 16, - "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3.1. A new governance framework\nIn the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework . This will help map obligations and commitments and set out a roadmap to guide their implementation.\nAs part of this new framework, the Commission will put in place a monitoring and review mechanism. This will include a clear set of agreed indicators and will enable regular progress assessment and set out corrective action if necessary. This mechanism will feed the Environmental Implementation Review and contribute to the European Semester.\nThe new governance framework will ensure co-responsibility and co-ownership by all relevant actors in meeting the EU's biodiversity commitments. It will support administrative capacity building, transparency, stakeholder dialogue, and participatory governance at different levels.\nThe Commission will assess the progress and suitability of this approach in 2023, and consider whether a legally binding approach to governance is needed.", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS\nEU Biodiversity Strategy for 2030\nBringing nature back into our lives", - "page_start": 0, - "page_end": 0, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "3.3.2. Investments, pricing and taxation\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget.\n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States' Prioritised Action Frameworks under the Habitats Directive.\n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds.\n72 See EU taxonomy for sustainable activities.\n73 World Wildlife Fund (2019), The Nature of Risk - A Framework for Understanding Nature-Related Risk to Business.\n17\nlegislation and guidance on green public procurement , the Commission will integrate criteria and monitoring to boost nature-based solutions.", - "page_start": 17, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "2.1. A coherent network of protected areas\nStates and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. Every Member State will have to do its fair share of the effort based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical marine and terrestrial ecosystems in the EU's outermost regions given their exceptionally high biodiversity value.\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up ecological corridors to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure 27 and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\nFinally, the Overseas Countries and Territories also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "3.3.2. Investments, pricing and taxation\nTackling biodiversity loss and restoring ecosystems will require significant public and private investments at national and European level. This will mean making the most of all relevant EU programmes and financing instruments. The Commission will strengthen its biodiversity proofing framework 69 , inter alia by using in an appropriate way the criteria established under the EU taxonomy, to ensure that EU funding supports biodiversity-friendly investments.\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and green infrastructure, at least €20 billion a year 70 should be unlocked for spending on nature . This will require mobilising private and public funding at national and EU level 71 , including through a range of different programmes in the next long-term EU budget. Moreover, as nature restoration will make a major contribution to climate objectives, a significant proportion of the 25% of the EU budget dedicated to climate action will be invested on biodiversity and nature-based solutions.\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be established to mobilise at least €10 billion over the next 10 years, based on public/private blended finance. Nature and biodiversity is also a priority for the European Green Deal Investment Plan. To help unlock the investment needed, the EU must provide long-term certainty for investors and help embed sustainability in the financial system. The EU sustainable finance taxonomy will help guide investment towards a green recovery and the deployment of nature-based solutions. In 2021, the Commission will adopt a delegated act under the Taxonomy Regulation 72 to establish a common classification of economic activities that substantially contribute to protecting and restoring biodiversity and ecosystems. This will be further supported by a Renewed Sustainable Finance Strategy later this year which will help ensure that the financial system contributes to mitigating existing and future risks to biodiversity and better reflect how biodiversity loss affects companies' profitability and long-term prospects 73 .\nThe Commission will further promote tax systems and pricing that reflect environmental costs, including biodiversity loss. This should encourage changes in national fiscal systems to shift the tax burden from labour to pollution, under-priced resources, and other environmental externalities. The ' user pays' and 'polluter pays' principles have to be applied to prevent and correct environmental degradation.\nPublic authorities' purchasing power represents 14% of EU GDP and can serve as a powerful driver of demand for the products and services of companies that invest in or contribute to nature-based solutions. To tap into this potential, when proposing further", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "4.2.3. International cooperation, neighbourhood policy and resource mobilisation\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to double financial flows to developing countries for biodiversity 82 . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle.\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)).\n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the World's Forests (COM(2019) 352).\n82 Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.\n21\npolicies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries practices and actions to protect and restore the world's forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the One Health approach 83 , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the NaturAfrica initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.", - "page_start": 21, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA\nBiodiversity is a priority of the EU's external action and an integral part of efforts to meet the United Nations Sustainable Development Goals. It will be mainstreamed throughout bilateral and multilateral engagements, through the EU's 'Green Deal diplomacy', and forthcoming green alliances 76 . The Commission will work closely with the European Parliament and Member States to ensure a high level of EU ambition and mobilise all efforts for the good of the world's biodiversity.", - "page_start": 19, - "page_end": 19, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "3.3.1. Business for biodiversity\nIn the partnership spirit of this strategy, all parts of the economy and society will have to play their role. Industry and business have an impact on nature, but they also produce the important innovations, partnerships and expertise that can help address biodiversity loss.\nTo ensure environmental and social interests are fully embedded into business strategies, the Commission will put forward a new initiative in 2021 on sustainable corporate governance . This initiative, which may take the form of a legislative proposal, will address human rights and environmental duty of care and due diligence across economic value chains in a proportionate way according to different sizes of entreprises 64 . This will help ensure that shareholder and stakeholder interests are fully aligned with the objectives set out in this strategy. In addition, in 2020, the Commission launched a review of the reporting obligations of businesses under the Non-Financial Reporting Directive 65 , with a view to improving the quality and scope of non-financial disclosures, including on environmental aspects such as biodiversity.\nThrough its existing platforms 66 , the Commission will help to build a European Business for Biodiversity movement, taking inspiration from recent initiatives 67 and making this movement an integral part of the European Climate Pact. Particular attention will be paid to measures to incentivise and eliminate barriers for the take-up of naturebased solutions, as these can lead to significant business and employment opportunities in various sectors 68 and are the key to innovation for economic or societal needs that rely on nature.\n62 Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental Assessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime (2008/99/EC).\n63 https://ec.europa.eu/environment/aarhus/\n64 Study on due diligence requirements through the supply chain - Final Report.\n65 Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and diversity information by certain large undertakings.\n66 Such as the EU Business @ Biodiversity Platform (B@B).\n67 See for example Business for Nature or One Planet Business for Biodiversity.\n68 BenDor et al. (2015), Estimating the Size and Impact of the Ecological Restoration Economy.\n16", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "2.2.1. Strengthening the EU legal framework for nature restoration\nNature restoration is already partially required from the Member States in existing EU legislation 28 . However, significant implementation and regulatory gaps hinder progress . For instance, there is no requirement for Member States to have biodiversity restoration plans. There are not always clear or binding targets and timelines and no definition or criteria on restoration or on the sustainable use of ecosystems. There is also no requirement to comprehensively map, monitor or assess ecosystem services, health or restoration efforts. These issues are exacerbated by the gaps in implementation that prevent the existing legislation from achieving its objectives 29 . Stronger implementation support and enforcement is required. To ensure that nature restoration across land and sea picks up, increases the EU's resilience, and contributes to climate change mitigation and adaptation as a key nature-based solution, this strategy puts forward two strands of actions:\n Firstly, and subject to an impact assessment, the Commission will put forward a proposal for legally binding EU nature restoration targets in 2021 to restore degraded ecosystems, in particular those with the most potential to capture and store carbon and to prevent and reduce the impact of natural disasters. This will identify the conditions in which the targets must be met, as well as the most effective measures to reach them. The impact assessment will also look at the possibility of an EU-wide methodology to map, assess and achieve good condition of ecosystems so they can deliver benefits such as climate regulation, water regulation, soil health, pollination and disaster prevention and protection.\n In that context, the Commission will request and support Member States to raise the level of implementation of existing legislation within clear deadlines. It will in particular request Member States to ensure no deterioration in conservation trends and status of all protected habitats and species by 2030 30 . In addition, Member States will have to ensure that at least 30% of species and habitats not\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework Directive (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive (2008/56/EC).\n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water Legislation (SWD(2019) 439). See also below, Section 3.2.\n30 Habitats and species listed under the Birds and Habitats Directives.\n6", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "5. CONCLUSION\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 th Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n83 https://www.who.int/features/qa/one-health/en/\n22", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "What is the EU's tolerance for unauthorised fishing?", - "target_page": 21, - "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "2.2.6. Restoring the good environmental status of marine ecosystems\nRestored and properly protected marine ecosystems bring substantial health, social and economic benefits to coastal communities and the EU as a whole. The need for stronger action is all the more acute as marine and coastal ecosystem biodiversity loss is severely exacerbated by global warming 42 .\nAchieving good environmental status of marine ecosystems, including through strictly protected areas, must involve the restoration of carbon-rich ecosystems as well as important fish spawning and nursery areas. Some of today's sea uses endanger food security, fishers' livelihoods, and the fishery and seafood sectors. Marine resources must be harvested sustainably and there must be zero-tolerance for illegal practices . In this regard, the full implementation of the EU's Common Fisheries Policy, the Marine Strategy Framework Directive and the Birds and Habitats Directives is essential.\nThe application of an ecosystem-based management approach under EU legislation 43 will reduce the adverse impacts of fishing, extraction and other human activities, especially on sensitive species and seabed habitats. To support this, national maritime spatial plans , which Member States have to deliver in 2021, should aim at covering all maritime sectors and activities, as well as area-based conservation-management measures. 44 The Commission will also propose a new action plan to conserve fisheries resources and protect marine ecosystems by 2021. Where necessary, measures will be introduced to limit the use of fishing gear most harmful to biodiversity, including on the seabed. It will also look at how to reconcile the use of bottom-contacting fishing gear with biodiversity goals, given it is now the most damaging activity to the seabed. This must be done in a fair and just way for all. The European Maritime and Fisheries Fund should also support the transition to more selective and less damaging fishing techniques.\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our oceans and biodiversity. This makes it all the more important to maintain or reduce fishing mortality at or under Maximum Sustainable Yield levels . This will help achieve a healthy population age and size distribution for fish stocks.\nThe by-catch of species threatened with extinction must also be eliminated or reduced to a level that allows full recovery. This should also be the case for those in bad conservation status or not in good environmental status. Furthermore, the by-catch of other species 45 must be eliminated or, where this is not possible, minimised so as not to\n41 Article 29 of the EU Renewable Energy Directive 2018/2001.", - "page_start": 11, - "page_end": 11, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Nature protection: key commitments by 2030\n1. Legally protect a minimum of 30% of the EU's land area and 30% of the EU's sea area and integrate ecological corridors, as part of a true Trans-European Nature Network.\n2. Strictly protect at least a third of the EU's protected areas, including all remaining EU primary and old-growth forests.\n3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.\n27 Guidance on a strategic framework for further supporting the deployment of EU-level green and blue infrastructure (SWD(2019) 193).\n5", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "4.2.1. International Ocean Governance\nIn line with the International Ocean Governance agenda 77 , the EU will support the conclusion of an ambitious legally binding agreement on marine biological diversity of areas beyond national jurisdiction (BBNJ) by the end of 2020. It must set clear global procedures for identifying, designating and effectively managing ecologically representative marine protected areas in the high seas. It should be ratified and implemented as quickly as possible.\nThe EU should also use all of its diplomatic leverage and outreach capacities to help broker agreement on the designation of three vast Marine Protected Areas in the Southern Ocean 78 , two of which were co-proposed by the EU in East Antarctica and in the Weddell Sea. If agreed, this would constitute one of the biggest acts of nature protection in history.\nWork will continue with partner countries and regional organisations to put in place measures to protect and sustainably use sensitive maritime ecosystems and species, including in areas beyond national jurisdiction, with a focus on marine biodiversity hotspots. The EU should continue supporting Small Island Developing States and other relevant partner countries to participate in meetings of regional and global organisations and bodies, and to implement relevant international commitments and regulations.\nThe EU will apply zero tolerance towards illegal, unreported and unregulated fishing and will combat overfishing, including through WTO negotiations on a global agreement to ban harmful fisheries subsidies .\nIn international negotiations, the EU should advocate that marine minerals in the international seabed area cannot be exploited before the effects of deep-sea mining on the marine environment, biodiversity and human activities have been sufficiently researched, the risks are understood and the technologies and operational practices are able to demonstrate no serious harm to the environment, in line with the precautionary\n77 International ocean governance agenda: an agenda for the future (JOIN(2016) 49).\n78 In the framework of the Commission for the Conservation of Antarctic Marine Living Resources.\n20\nprinciple 79 and taking into account the call of the European Parliament 80 . In parallel, the EU will continue to fund research on the impact of deep-sea mining activities and on environmentally-friendly technologies. The EU should also advocate for more transparency in international bodies such as the International Seabed Authority.", - "page_start": 20, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "24. -(1) A person who is-\n( d ) The Civil Aviation Authority was established under section 1(1) of the Civil Aviation Act 1971 (c. 75). That Act was replaced by a consolidating statute, the Civil Aviation Act 1982 (c. 16), section 2(1) of which provides for the continued existence of the Civil Aviation Authority. There are amendments to section 2 but none is relevant. The European Union Aviation Safety Agency was established by Regulation (EU) 2018/1139 of the European Parliament and of the Council of 4 July 2018 on common rules in the field of civil aviation and establishing a European Union Aviation Safety Agency, and amending Regulations (EC) No 2111/2005, (EC) No 1008/2008, (EU) No 996/2010, (EU) No 376/2014 and Directives 2014/30/EU and 2014/53/EU of the European Parliament and of the Council, and repealing Regulations (EC) No 552/2004 and (EC) No 216/2008 of the European Parliament and of the Council and Council Regulation (EEC) No 3922/91.\n42\nof crude oil based fuels to consumers in the United Kingdom or persons carrying on business in the United Kingdom; and\n(b) the activities are required to ensure continued safe operation of the facility,\nwhere they have travelled to the United Kingdom in the course of their work.", - "page_start": 41, - "page_end": 42, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "2.2.1. Strengthening the EU legal framework for nature restoration\nNature restoration is already partially required from the Member States in existing EU legislation 28 . However, significant implementation and regulatory gaps hinder progress . For instance, there is no requirement for Member States to have biodiversity restoration plans. There are not always clear or binding targets and timelines and no definition or criteria on restoration or on the sustainable use of ecosystems. There is also no requirement to comprehensively map, monitor or assess ecosystem services, health or restoration efforts. These issues are exacerbated by the gaps in implementation that prevent the existing legislation from achieving its objectives 29 . Stronger implementation support and enforcement is required. To ensure that nature restoration across land and sea picks up, increases the EU's resilience, and contributes to climate change mitigation and adaptation as a key nature-based solution, this strategy puts forward two strands of actions:\n Firstly, and subject to an impact assessment, the Commission will put forward a proposal for legally binding EU nature restoration targets in 2021 to restore degraded ecosystems, in particular those with the most potential to capture and store carbon and to prevent and reduce the impact of natural disasters. This will identify the conditions in which the targets must be met, as well as the most effective measures to reach them. The impact assessment will also look at the possibility of an EU-wide methodology to map, assess and achieve good condition of ecosystems so they can deliver benefits such as climate regulation, water regulation, soil health, pollination and disaster prevention and protection.\n In that context, the Commission will request and support Member States to raise the level of implementation of existing legislation within clear deadlines. It will in particular request Member States to ensure no deterioration in conservation trends and status of all protected habitats and species by 2030 30 . In addition, Member States will have to ensure that at least 30% of species and habitats not\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework Directive (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive (2008/56/EC).\n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water Legislation (SWD(2019) 439). See also below, Section 3.2.\n30 Habitats and species listed under the Birds and Habitats Directives.\n6", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "4.2.2. Trade policy\nTrade policy will actively support and be part of the ecological transition . In this spirit, the Commission will ensure full implementation and enforcement of the biodiversity provisions in all trade agreements, including through the EU Chief Trade Enforcement Officer. The Commission will better assess the impact of trade agreements on biodiversity, with follow-up action to strengthen the biodiversity provisions of existing and new agreements if relevant. The Commission will also present in 2021 a legislative proposal and other measures to avoid or minimise the placing of products associated with deforestation or forest degradation on the EU market 81 , and to promote forest-friendly imports and value chains. The Commission will take a number of steps to crack down on illegal wildlife trade . This trade contributes to the depletion or extinction of entire species, is the world's fourth most lucrative black market and is thought to be one of the causes behind the emergence of zoonotic diseases. It is a human, economic and environmental duty to dismantle it.\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife Trafficking in 2021 and propose a further tightening of the rules on EU ivory trade later this year. It will explore a possible revision of the Environmental Crime Directive, including by looking at expanding its scope and introducing specific provisions for types and levels of criminal sanctions. It will consider strengthening the coordinating and investigative capacities of the European Anti-Fraud Office (OLAF) to work with Member States and non-EU countries to prevent illicit trade and the entry of illicit products into the Single Market.\nThe Commission will continue to engage with partner countries to ensure a smooth and fair transition, mobilising in particular Aid for Trade to ensure that partners reap the benefits of biodiversity-friendly trade.", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "II.18.1. Grounds for termination by the contracting authority\nThe contracting authority may terminate the FWC or any on-going specific contract in the following circumstances:\n(a) if provision of the services under an on-going specific contract has not actually started within 15 days of the scheduled date and the contracting authority considers that the new date proposed, if any, is unacceptable, taking into account Article II.11.2;\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence required for implementation of the FWC ;\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or request for service or is in breach of another substantial contractual obligation or repeatedly refuses to sign specific contracts. Termination of three or more specific contracts in these circumstances also constitutes grounds for termination of the FWC;\n(d) if the contractor or any person that assumes unlimited liability for the debts of the contractor is in one of the situations provided for in points (a) and (b) of Article 136(1) of the Financial Regulation 6 ;\n(e) if the contractor or any related person is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n(f) if the procedure for awarding the FWC or the implementation of the FWC prove to have been subject to irregularities , fraud or breach of obligations ;\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) No 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No 223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No 966/2012, OJ L 193 of 30.7.2018, p.1 https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n30", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "5.3 Workforce structure\nRegarding OSH, it is important to consider that migrants from non-EU countries are overrepresented in certain sectors and occupations like cleaners and helpers, personal services and care, building workers, mining, manufacturing, transport, food and agriculture. The next table shows the percentage of non-EU citizens in the workforce of certain occupations compared to the share of workforce of EU citizens in the same occupations. 310\nEuropean Agency for Safety and Health at Work - EU-OSHA\n112\nOccupational safety and health in Europe - state and trends 2023\nTable 32: Non-EU Migrants - over-represented in certain sectors and occupations in 2019\nThe highest share of intra-EU and extra-EU workers per occupation is among cleaners and helpers (37% in total, intra-EU 11%, extra-EU 25%), labourers in mining and construction (24% in total, intraEU 7%, extra-EU 17%), stationary plant and machine operators (20% in total, intra-EU 6%, extra-EU 14%), and personal care workers (19% in total, intra-EU 5%, extra-EU 14%). 311\nThe occupations with a high share of migrant workforce are those with higher physical risks and lower expectations to do this job until 60 years old . The common characteristic of these occupations is the well-known 3-D assignment: dirty, dangerous and demanding. 312\nBeside the occupation-related risks, specific health and safety issues might result from a lower level of language dominance; communication and instruction have to cope with different capacities to speak and understand. In a more diverse workforce other factors might differ, like awareness and traditions regarding aspects such as the importance of hierarchy, ways to communicate, perception of behaviour as aggression, harassment and discrimination. In general, a greater variety of the workforce poses wider challenges for prevention.\nPosting of workers has similar implications for the organisation of OSH in enterprises. 313 Posting means that companies provide services in other EU Member States without having to establish themselves in the other countries. They send out employees to carry out the tasks required. The latest official data from 2020 estimated 2.3 million posted workers in the EU. 314\nEuropean Agency for Safety and Health at Work - EU-OSHA\n113\nOccupational safety and health in Europe - state and trends 2023\nFigure 41: Posted workers, receiving and sending countries in the EU 315", - "page_start": 111, - "page_end": 113, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "II.4. Provision of services\nII.4.1 Signature of the FWC does not guarantee any actual purchase. The contracting authority is bound only by specific contracts implementing the FWC.\nII.4.2 The contractor must provide services of high quality standards, in accordance with the state of the art in the industry and the provisions of this FWC, in particular the tender specifications and the terms of its tender. Where the contracting authority has the right to make modifications to the results , they must be delivered in a format and with the necessary information which effectively allow such modifications to be made in a convenient manner.\nII.4.3 The contractor must comply with the minimum requirements provided for in the tender specifications. This includes compliance with applicable obligations under environmental, social and labour law established by Union law, national law and collective agreements or by the international environmental, social and labour law provisions listed in Annex X to Directive 2014/24/EU4 3 , compliance with data protection obligations resulting from Regulation (EU) 2016/6795 4 and Regulation (EU) 2018/1725 5 .\n3 OJ L 94 of 28.03.2014, p. 65\n4 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC, OJ L 119, 4.5.2016, p. 1, https://eurlex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n5 Regulation (EU) 2018/1725 of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement\n15\nContract number: ECHA/2019/355\nFWC conditions of October 2018", - "page_start": 14, - "page_end": 15, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "https://committee.iso.org/home/tc283\n450 European Centre for the Development of Vocational Training CEDEFOP (https://www.cedefop.europa.eu/) Skills Panorama: https://skillspanorama.cedefop.europa.eu/en\n451 European Institute for Gender Equality EIGE (https://eige.europa.eu/ ) Gender Statistics Database, Work and Labour market, https://eige.europa.eu/gender-statistics/dgs, Gender Equality Index, e.g. index of digitalisation in the world of work (2020)\n452 European Chemical Agency ECHA (https://echa.europa.eu/home) Exposure scenario examples\n453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security http://www.emsa.europa.eu/we-do/safety.html\n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on 'Trafficking and labour exploitation, e.g the report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation - Role of the Employers Sanctions Directive\n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), Section 'Best practice', Policy and practice briefings: Work places, https://www.emcdda.europa.eu/bestpractice/briefings/workplace_en\nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro\nEuropean Agency for Safety and Health at Work - EU-OSHA\n158\nOccupational safety and health in Europe - state and trends 2023\nenhancers. That is medication like tranquilizers, particularly in highly emotional jobs, or stimulants to survive long working hours - truck drivers, pilots, doctors etc..", - "page_start": 157, - "page_end": 158, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "What are the missions of the Sumitomo Mitsui Financial Group?", - "target_page": 7, - "target_passage": "• To provide optimum added value to our customers and together with them achieve growth • To create sustainable shareholder value through business growth• To create sustainable shareholder value through business growth • To provide a challenging and professionally rewarding work environment for our dedicated employees• To provide a challenging and professionally rewarding work environment for our dedicated employee", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Further measures needed\n● Share expertise in corporate social responsibility Share expertise in corporate social responsibility with the international community with the international community\n● Improve financial services in preparation for the Improve financial services in preparation for the globalization of operations in Japan (multilingual globalization of operations in Japan (multilingual support) support)\n● Promote diversity Promote diversity\nCSR REPORT 2011\n10\nIn the past, the Sumitomo Group In the past, the Sumitomo Group programs to solve the problem of programs to solve the problem of mine, while the Mitsui Group set up mine, while the Mitsui Group set up give the poorest in society access to give the poorest in society access to corporate social responsibility corporate social responsibility philosophies of both the Sumitomo philosophies of both the Sumitomo years of their existence, we will years of their existence, we will problems facing the international problems facing the international service service operations.operations.\nundertook large-scale afforestation undertook large-scale afforestation pollution around the Besshi copper pollution around the Besshi copper the Mitsui Memorial Hospital to the Mitsui Memorial Hospital to basic medical care. Based on this basic medical care. Based on this DNA embedded in the business DNA embedded in the business and Mitsui groups over the 400 and Mitsui groups over the 400 continue to play our part in solving continue to play our part in solving community through our financial community through our financial", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "www.smfg.co.jp/english\nSumitomo Mitsui Financial Group CSR Report\nDigest version", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Recycling of rare earths used in smart cards\nAt Sumitomo Mitsui Card, rare earths At Sumitomo Mitsui Card, rare earths extracted from IC chips from expired credit extracted from IC chips from expired credit cards are recycled. cards are recycled.\nSumitomo Mitsui Financial Group CSR Report", - "page_start": 11, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Corporate Outline (as of September 30, 2011)\nCompany Name\nBusiness Description\nEstablished\nHead Office\nChairman of the Board\nPresident\nCapital\nStock Exchange Listings\nSumitomo Mitsui Financial Group, Inc. ::\nManagement of banking subsidiaries (under the stipulations of Japan's Banking Act) and of non-bank subsidiaries, as well as the performance of ancillary functions :\nDecember 2, 2002 :\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan :\nMasayuki Oku :\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) :\n¥2,337.8 billion :\nTokyo Stock Exchange (First Section) :\nOsaka Securities Exchange (First Section) Nagoya Stock Exchange (First Section) Note: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Company name abbreviations and other special terminology\nThroughout this report, 'Sumitomo Mitsui Financial Group' or 'SMFG' refers to the holding company alone. 'The SMFG Group' refers to the holding company and its primary domestic and international subsidiaries and affiliates.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Listing on the New York Stock Exchange\nIn November 2010, the Sumitomo Mitsui In November 2010, the Sumitomo Mitsui Financial Group listed on the New York Financial Group listed on the New York Stock Exchange. This move, we believe, not Stock Exchange. This move, we believe, not only significantly increases convenience for only significantly increases convenience for our overseas shareholders and investors, our overseas shareholders and investors, but also broadens our customer base as it but also broadens our customer base as it further increases the transparency of our further increases the transparency of our financial position. Listing on the New York financial position. Listing on the New York Stock Exchange as a socially responsible Stock Exchange as a socially responsible corporation accelerates our evolution into a corporation accelerates our evolution into a global player. global player.\nSumitomo Mitsui Financial Group CSR Report\nSpecific Examples of CSR Activities", - "page_start": 9, - "page_end": 10, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Scope of this Report\nGLYPH<129> Sumitomo Mitsui Financial Group, Inc.\nGLYPH<129> Sumitomo Mitsui Banking Corporation\nGLYPH<129> SMFG Card & Credit, Inc.\nGLYPH<129> Sumitomo Mitsui Card Company, Limited\nGLYPH<129> Cedyna Financial Corporation\nGLYPH<129> Sumitomo Mitsui Finance and Leasing Co., Ltd.\nGLYPH<129> The Japan Research Institute, Limited\nGLYPH<129> SMBC Friend Securities Co., Ltd.\nGLYPH<129> SMBC Nikko Securities Inc.\nGLYPH<129> THE MINATO BANK, LTD.\nGLYPH<129> Kansai Urban Banking Corporation\nGLYPH<129> Other Group companies", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Sumitomo Mitsui Finance & Leasing: Promoting recycling and reuse\nAs part of its core leasing operations, As part of its core leasing operations, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is helping reduce customers' environmental helping reduce customers' environmental\nRecycling and reuse of old equipment and machinery\nload through measures such as 'carbon load through measures such as 'carbon neutral leases' (with carbon credits allocated neutral leases' (with carbon credits allocated in proportion to emission volumes of leased in proportion to emission volumes of leased assets) and leasing of environment-friendly assets) and leasing of environment-friendly and energy-saving equipment. and energy-saving equipment.\nLikewise, by trading used machinery and Likewise, by trading used machinery and semiconductor- manufacturing equipment, semiconductor- manufacturing equipment, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is supporting more efficient capital investment supporting more efficient capital investment by its customers, while itself evolving into a by its customers, while itself evolving into a recycling-oriented, environment-friendly recycling-oriented, environment-friendly company. company.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "About this Report\nPeriod Covered\nPublication Date of Japanese Document\nContact\n: April 1, 2010 to March 31, 2011 ( 'Fiscal 2010' )\n: December 2011\n:\nNote: Certain items in this report refer to activities taking place after April 2011.\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. 1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 TEL: +81-3-3282-8111", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "Did Katsutoshi Konuma participate in the August 2011 expert roundtable on the role of the Sumitomo Mitsui Financial Group's new Food and Agricultural Assessment Loan? ", - "target_page": 8, - "target_passage": "Key comments of participants Together with Our Customers Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "Further measures needed\n● Share expertise in corporate social responsibility Share expertise in corporate social responsibility with the international community with the international community\n● Improve financial services in preparation for the Improve financial services in preparation for the globalization of operations in Japan (multilingual globalization of operations in Japan (multilingual support) support)\n● Promote diversity Promote diversity\nCSR REPORT 2011\n10\nIn the past, the Sumitomo Group In the past, the Sumitomo Group programs to solve the problem of programs to solve the problem of mine, while the Mitsui Group set up mine, while the Mitsui Group set up give the poorest in society access to give the poorest in society access to corporate social responsibility corporate social responsibility philosophies of both the Sumitomo philosophies of both the Sumitomo years of their existence, we will years of their existence, we will problems facing the international problems facing the international service service operations.operations.\nundertook large-scale afforestation undertook large-scale afforestation pollution around the Besshi copper pollution around the Besshi copper the Mitsui Memorial Hospital to the Mitsui Memorial Hospital to basic medical care. Based on this basic medical care. Based on this DNA embedded in the business DNA embedded in the business and Mitsui groups over the 400 and Mitsui groups over the 400 continue to play our part in solving continue to play our part in solving community through our financial community through our financial", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "www.smfg.co.jp/english\nSumitomo Mitsui Financial Group CSR Report\nDigest version", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Corporate Outline (as of September 30, 2011)\nCompany Name\nBusiness Description\nEstablished\nHead Office\nChairman of the Board\nPresident\nCapital\nStock Exchange Listings\nSumitomo Mitsui Financial Group, Inc. ::\nManagement of banking subsidiaries (under the stipulations of Japan's Banking Act) and of non-bank subsidiaries, as well as the performance of ancillary functions :\nDecember 2, 2002 :\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan :\nMasayuki Oku :\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) :\n¥2,337.8 billion :\nTokyo Stock Exchange (First Section) :\nOsaka Securities Exchange (First Section) Nagoya Stock Exchange (First Section) Note: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Roundtable session: SMBC Food and Agricultural Assessment Loan\nA roundtable session with experts held in August 2011 considered the role of the new SMBC Food and Agricultural Assessment Loan in improving the food supply chain that links food and fishery producers with food processors and consumers. Opinions were also exchanged on what other future role the bank might assume in this regard, given the current situation and issues facing the food industry\nand agriculture in Japan.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "About this Report\nPeriod Covered\nPublication Date of Japanese Document\nContact\n: April 1, 2010 to March 31, 2011 ( 'Fiscal 2010' )\n: December 2011\n:\nNote: Certain items in this report refer to activities taking place after April 2011.\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. 1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 TEL: +81-3-3282-8111", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Key comments of participants\n'We want to deliver value by creating demand and quality combined with safety, peace of mind and trust.' Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd.\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, The University of Tokyo\n'Eating should be something that generates emotion. New potential exists in the world of cuisine.' Daisuke Yamamoto, Vice Senior Consultant, Research Department,\nThe Japan Research Institute, Limited\n'As consumer tastes go through a time of great change, I think it is important to prioritize ingredients and the attitude of customers toward eating.'\nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of the Corporate Banking Unit & Middle Market Banking Unit, SMBC\n'An important concept is multilateral dialogue as the number of parties involved in food production increases throughout the supply chain.'\nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC\nThe SMBC Food and Agricultural Assessment The SMBC Food and Agricultural Assessment Loan comes with conditions, depending on Loan comes with conditions, depending on the results of an evaluation of food-producers' the results of an evaluation of food-producers' progress in areas such as food safety and progress in areas such as food safety and environment-friendliness, healthiness and environment-friendliness, healthiness and nutritional value, and efficiency of distribution. nutritional value, and efficiency of distribution. The Japan Research Institute researches The Japan Research Institute researches\nmeasures in the measures in the areas areas of food and o f f o o d a n d farming being taken farming being taken by the loan applicant, by the loan applicant, and drafts a simple and drafts a simple 'diagnosis' stating 'diagnosis' stating whether there is room whether there is room\nfor future improvement. Ernst & Young for future improvement. Ernst & Young ShinNihon LLC provides expert opinions on ShinNihon LLC provides expert opinions on ongoing improvement of this system. ongoing improvement of this system.\nBy backing customer companies' own By backing customer companies' own initiatives in the areas of food and agriculture initiatives in the areas of food and agriculture in this way, SMBC will be supporting measures in this way, SMBC will be supporting measures to improve the diet of the Japanese and to improve the diet of the Japanese and strengthen the agriculture and fisheries sector. strengthen the agriculture and fisheries sector.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Recycling of rare earths used in smart cards\nAt Sumitomo Mitsui Card, rare earths At Sumitomo Mitsui Card, rare earths extracted from IC chips from expired credit extracted from IC chips from expired credit cards are recycled. cards are recycled.\nSumitomo Mitsui Financial Group CSR Report", - "page_start": 11, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "EXECUTIVE COMMITTEE MEMBERS\nCarlos Ghosn\nToshiyuki Shiga\nItaru Koeda\nTadao Takahashi\nHiroto Saikawa\nMitsuhiko Yamashita\nCarlos Tavares\nAlain-Pierre Raynaud\n(As of June 21, 2005)\nNissan Annual Report 2004\n5\nEXECUTIVES\nPERFORMANCE\n6", - "page_start": 6, - "page_end": 7, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Representative Board Members\nCarlos Ghosn\nPresident and Co-Chairman\nItaru Koeda\nCo-Chairman\nToshiyuki Shiga\nCo-Chairman\nBoard Members\nTadao Takahashi\nHiroto Saikawa\nMitsuhiko Yamashita\nCarlos Tavares\nShemaya Lévy\nPatrick Pélata\nAuditors\nHisayoshi Kojima\nShinji Ichishima\nKeishi Imamura\nHaruo Murakami", - "page_start": 6, - "page_end": 6, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "What is the trend of flood risk in Canada in 2024?", - "target_page": 1, - "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Three ways Canadian communities are reducing flood risks\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact's Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions.\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown's east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community's flood risk by catching and absorbing rainfall and runoff from surrounding surfaces.\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance. Residents can input their addresses to see if they are at risk and learn tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year.\nRebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events.\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\nwww.newscanada.com\nWord Count: 281\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "ISSUE\nDecember 2024", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "ISSUE\nDecember 2024", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "Article history:\nReceived 14 November 2023\nReceived in revised form 11 April 2024\nAccepted 25 May 2024\nAvailable online 15 August 2024", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" - }, - { - "text": "(5) Net Assets\nNet assets with donor restrictions at June 30, 2024 and 2023 are available for the following purposes:\nRestricted to future periods:, 2024 = $ 50,000. Restricted to future periods:, 2023 = 100,000. Restricted by purpose:, 2024 = . Restricted by purpose:, 2023 = . Abstract Wikipedia, 2024 = 861,008. Abstract Wikipedia, 2023 = 1,249,004. Artificial intelligence, 2024 = 239,878. Artificial intelligence, 2023 = -. Endowment support, 2024 = -. Endowment support, 2023 = 1,297,620. Future Audiences, 2024 = 500,000. Future Audiences, 2023 = -. Knowledge equity, 2024 = 965,910. Knowledge equity, 2023 = 2,228,134. Machine learning, 2024 = 24,528. Machine learning, 2023 = 860,620. Media Wiki, 2024 = 1,500,000. Media Wiki, 2023 = -. Other, 2024 = 125,000. Other, 2023 = 147,295. Restricted to future periods and by purpose:, 2024 = . Restricted to future periods and by purpose:, 2023 = . Artificial intelligence, 2024 = 1,430,000. Artificial intelligence, 2023 = -. Net assets with donor restrictions, 2024 = $ 5,696,324. Net assets with donor restrictions, 2023 = 5,782,673", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Consolidated Statements of Financial Position\nJune 30, 2024 and 2023", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "2024 Notes\nDuring the second quarter of 2024, the 2024 Notes reached maturity and were fully settled. Additionally, during the third quarter of 2024, we settled the warrants entered into in connection with the issuance of the 2024 Notes, resulting in the issuance of 8.5 million shares of our common stock. The remaining warrants were settled in October 2024.", - "page_start": 24, - "page_end": 24, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Consolidated Statements of Financial Position\nCurrent assets:, 2024 = . Current assets:, 2023 = . Cash and cash equivalents, 2024 = $ 82,845,159. Cash and cash equivalents, 2023 = 75,808,401. Contributions receivable, 2024 = 856,657. Contributions receivable, 2023 = -. Short-term investments, 2024 = 116,074,763. Short-term investments, 2023 = 132,216,667. Prepaid expenses and other current assets, 2024 = 5,722,457. Prepaid expenses and other current assets, 2023 = 5,569,485. Total current assets, 2024 = 205,499,036. Total current assets, 2023 = 213,594,553. Restricted cash, 2024 = 1,428,542. Restricted cash, 2023 = 1,396,717. Long-term investments, 2024 = 67,291,224. Long-term investments, 2023 = 43,265,786. Right of use asset - operating lease, net, 2024 = -. Right of use asset - operating lease, net, 2023 = 1,821,174. Property and equipment, net, 2024 = 11,826,136. Property and equipment, net, 2023 = 14,045,139. Contributions receivable, 2024 = 715,000. Contributions receivable, 2023 = -. Total assets, 2024 = $ 286,759,938. Total assets, 2023 = 274,123,369. Liabilities and Net Assets, 2024 = . Liabilities and Net Assets, 2023 = . Current liabilities:, 2024 = . Current liabilities:, 2023 = . Accounts payable, 2024 = $ 4,009,582. Accounts payable, 2023 = 2,783,904. Accrued expenses, 2024 = 7,959,558. Accrued expenses, 2023 = 6,922,259. Lease liability, 2024 = 417,756. Lease liability, 2023 = 1,640,735. Donations payable to Wikimedia Endowment, 2024 = 525,607. Donations payable to Wikimedia Endowment, 2023 = 5,274,448.", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nSalaries and benefits, 2024.Programs = $ 83,645,901. Salaries and benefits, 2024.General and administrative = 14,018,534. Salaries and benefits, 2024.Fundraising = 9,129,525. Salaries and benefits, 2024.Total = 106,793,960. Awards and grants, 2024.Programs = 26,820,080. Awards and grants, 2024.General and administrative = -. Awards and grants, 2024.Fundraising = -. Awards and grants, 2024.Total = 26,820,080. Internet hosting, 2024.Programs = 3,116,257. Internet hosting, 2024.General and administrative = 188. Internet hosting, 2024.Fundraising = -. Internet hosting, 2024.Total = 3,116,445. In-kind service expenses, 2024.Programs = 228,338. In-kind service expenses, 2024.General and administrative = 35,138. In-kind service expenses, 2024.Fundraising = -. In-kind service expenses, 2024.Total = 263,476. Donation processing expenses, 2024.Programs = -. Donation processing expenses, 2024.General and administrative = -. Donation processing expenses, 2024.Fundraising = 7,547,718. Donation processing expenses, 2024.Total = 7,547,718. Professional service expenses, 2024.Programs = 9,670,261. Professional service expenses, 2024.General and administrative = 1,870,513. Professional service expenses, 2024.Fundraising = 1,549,266. Professional service expenses, 2024.Total = 13,090,040. Other operating expenses, 2024.Programs = 6,420,517. Other operating expenses, 2024.General and administrative = 3,808,725. Other operating expenses, 2024.Fundraising = 568,898. Other operating expenses, 2024.Total = 10,798,140. Travel and conferences, 2024.Programs = 4,979,409. Travel and conferences, 2024.General and administrative = 536,887. Travel and conferences, 2024.Fundraising = 308,683. Travel and conferences, 2024.Total = 5,824,979. Depreciation and amortization, 2024.Programs =", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "How flooding was prevented in Vancouver? ", - "target_page": 1, - "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Three ways Canadian communities are reducing flood risks\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact's Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions.\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown's east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community's flood risk by catching and absorbing rainfall and runoff from surrounding surfaces.\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance. Residents can input their addresses to see if they are at risk and learn tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year.\nRebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events.\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\nwww.newscanada.com\nWord Count: 281\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "Acknowledgments\nAuthor contributions: S. D. A. and G. A. W. contributed to conception and design. J. B., E. G., G. A. W., K. L. V., and S. D. A. contributed to analysis and interpretation. J. B., E. G., G. A. W., K. L. V., S. D. A., C. B., C. L., L.-P. B., A. C., E. P., S. K. F., S. G., R. A. M., I. M., M. B., P. H., M. D. L., M. A., C. J. L., T. A., N. E., G. G. A., and S. M. contributed to drafting the manuscript for important intellectual content. All authors had access to and participated in the interpretation of the data and provided input into the preparation and submission of the manuscript. The authors vouch for the accuracy and completeness of the data.\nRole of sponsors: The sponsor had no role in the design of the study, the collection and analysis of the data, or the preparation of the manuscript.\nOther contributions: We thank the following individuals from the Canadian study sites: Ottawa Hospital Research Institute, Ottawa, Ontario: Taylor Poulin; Susan Deveau, RRT; Victoria Thompson; Meredith McCleery; Angelina Tohme; Vicky Panteleakos, RRT; Geneviève Longtin, RRT; Joanne Cassidy, RRT; Amanda Bergeron, MSc; Jennifer Biggs, RN; Jessica Bergeron; and Elisabet White; Vancouver General Hospital, Vancouver, British Columbia: Shelley Abercromby, BSc; Jana Caine; David\nchestjournal.org\n1307\nwith inadequate physician-led investigations of symptoms, may explain why dyspnea often goes undiagnosed in the population. 33", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Phyllis J. Campbell, 63\nChairman of the Pacific Northwest Region JPMorgan Chase Seattle, Washington", - "page_start": 92, - "page_end": 92, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "6.2 Setting up the deployment environment\nThis section shows how to set up the environment.", - "page_start": 117, - "page_end": 117, - "source_file": "sg248459.pdf" - }, - { - "text": "Washington State Encourages the Use of Compost, to Protect Our Water Quality\nThe Washington State Department of Ecology recommends that soils on construction sites be restored with compost before planting, and also encourages the use of compost for construction site erosion control, to reduce stormwater runoff and help keep our rivers, lakes, and Puget Sound clean. Learn more at www.SoilsforSalmon.org or www.BuildingSoil.org.", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(°F), Mar = -10.5. Record low °C (°F), Apr = -3.2 (26.2). Record low °C (°F), May = -0.3 (31.5). Record low °C (°F), Jun = 3.6. Record low °C (°F), Jul = 6.1 (43.0). Record low °C (°F), Aug = 5.2 (41.4). Record low °C (°F), Sep = 1.9 (35.4). Record low °C (°F), Oct = -3.2 (26.2). Record low °C (°F), Nov = -7.1. Record low °C (°F), Dec = . Record low °C (°F), Year = -23.0 (-9.4). Average precipitation mm (inches), Jan = 54.0. Average precipitation mm (inches), Feb = 53.8. Average precipitation mm (inches), Mar = (13.1) 72.2. Average precipitation mm (inches), Apr = 56.1. Average precipitation mm (inches), May = 72.6 (2.86). Average precipitation mm (inches), Jun = (38.5) 73.2. Average precipitation mm (inches), Jul = 54.5 (2.15). Average precipitation mm (inches), Aug = 71.6 (2.82). Average precipitation mm (inches), Sep = 53.2 (2.09). Average precipitation mm (inches), Oct = 56.2 (2.21). Average precipitation mm (inches), Nov = (19.2) 68.0 (2.68). Average precipitation mm (inches), Dec = -16.0 (3.2) 55.8 (2.20). Average precipitation mm (inches), Year = 741.2 (29.19). Average precipitation days (≥ 1.0 mm), Jan = (2.13) 10.4. Average precipitation days (≥ 1.0 mm), Feb = (2.12) 9.3. Average precipitation days (≥ 1.0 mm), Mar = (2.84) 9.7. Average precipitation days", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia4.pdf" - }, - { - "text": "13. -(1) A road haulage worker.\n(2) For the purposes of sub-paragraph (1)-\n(a) 'essential or emergency works' includes-\n(i) inspections, maintenance, repairs, and asset replacement activities,\n(ii) monitoring, sampling and analysis of water supplies under the Private Water Supplies (England) Regulations 2016( a ), the Water Supply (Water Quality) Regulations 2016( b ), the Private Water Supplies (Wales) Regulations 2017( c ), or the Water Supply (Water Quality) Regulations 2018( d );\n(b) 'sewerage licensee' means the holder of a sewerage licence under section 17BA of the Water Industry Act 1991( e );\n(c) 'sewerage services' has the meaning given in section 219(1) of the Water Industry Act 1991( f );\n(d) 'water supply licensee' has the meaning given in sections 17A(7) and 219(1) of the Water Industry Act 1991( g ).\n22. -(1) Workers engaged in essential or emergency works relating to flood and coastal erosion risk management on behalf of-\n(a) the Environment Agency; or\n(b) a lead local flood authority in England.\n(2) For the purposes of sub-paragraph (1)-\n(a) 'flood' and 'coastal erosion' have the meanings given in section 1 of the Flood and Water Management Act 2010( h );\n(b) 'lead local flood authority' has the meaning given in section 6(7) of that Act;\n(c) 'risk management' has the meaning given in section 3 of that Act( i ).\n23. -(1) Workers engaged in essential or emergency works-\n(a) related to-\n(i) a generating station,\n(ii) an electricity interconnector,\n(iii) a district heat network as defined in regulation 2 of the Heat Network (Metering and Billing) Regulations 2014( j ),\n(iv) communal heating as defined in regulation 2 of the Heat Network (Metering and Billing) Regulations 2014,\n(v) automated ballast cleaning and track re-laying systems on a network, or\n(vi) the commissioning, maintenance and repair of industrial machinery for use on a network; or\n( a ) S.I. 2016/618; relevant amending instruments are S.I. 2017/506, 2018/707 and 2019/558.", - "page_start": 39, - "page_end": 39, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "James P. Jerome\nVice President, Managing Director Software Solutions", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(°F), Jan = -23.0 (-9.4). Record low °C (°F), Feb = -22.5 (-8.5). Record low °C (°F), Mar = -10.5 (13.1). Record low °C (°F), Apr = -4.4 (24.1). Record low °C (°F), May = -3.8 (25.2). Record low °C (°F), Jun = 2.3 (36.1). Record low °C (°F), Jul = 6.1 (43.0). Record low °C (°F), Aug = 4.6 (40.3). Record low °C (°F), Sep = 0.2 (32.4). Record low °C (°F), Oct = -4.5 (23.9). Record low °C (°F), Nov = -9.4 (15.1). Record low °C (°F), Dec = -24.6 (-12.3). Record low °C (°F), Year = -24.6 (-12.3). Average precipitation mm (inches), Jan = 49.8 (1.96). Average precipitation mm (inches), Feb = 41.6 (1.64). Average precipitation mm (inches), Mar = 49.4 (1.94). Average precipitation mm (inches), Apr = 68.9 (2.71). Average precipitation mm (inches), May = 80.9 (3.19). Average precipitation mm (inches), Jun = 74.1 (2.92). Average precipitation mm (inches), Jul = 67.4 (2.65). Average precipitation mm (inches), Aug = 65.5 (2.58). Average precipitation mm (inches), Sep = 82.5 (3.25). Average precipitation mm (inches), Oct = 99.8 (3.93). Average precipitation mm (inches), Nov = 87.2 (3.43). Average precipitation mm (inches), Dec = 53.7 (2.11). Average precipitation mm (inches), Year = 820.8 (32.31). Average precipitation days (≥", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "VICTORIA\nOtway Basin (Onshore) PEP 160, 1 = 60.0. Otway Basin (Offshore), 1 = . VIC/P44 (Casino)*, 1 = 50.0. VIC/P51*, 1 = 55.0\nVIC/P52*, % Interest = 33.3. VIC/RL7 (La Bella), % Interest = 10.0. VIC/L22 (Minerva), % Interest = 10.0. Gippsland Basin, % Interest = . VIC/RL1 (v) (Golden Beach)* (I), % Interest = 100.0. VIC/RL2 (Kipper), % Interest = 20.0. VIC/RL3 (Sole) (I), % Interest = 90.0. VIC/L21 (Patricia-Baleen)* (I), % Interest = 90.0. VIC/P55* (I), % Interest = 66.7", - "page_start": 43, - "page_end": 43, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "How can citizens in Fredericton easily access flood risk data?", - "target_page": 1, - "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Three ways Canadian communities are reducing flood risks\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact's Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions.\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown's east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community's flood risk by catching and absorbing rainfall and runoff from surrounding surfaces.\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance. Residents can input their addresses to see if they are at risk and learn tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year.\nRebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events.\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\nwww.newscanada.com\nWord Count: 281\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "Investment in the Urban Centres of New Brunswick and PEI\n26% of Killam's apartment NOI is currently generated in New Brunswick, split principally between the province's three major urban centres, Fredericton, Moncton and Saint John. Fredericton and Moncton both experienced high population growth over the last number of years, posting 9.3% and 8.7% growth, respectively, between the 2006 and 2011 Census periods. Fredericton is the provincial capital and home to the province's largest university. Moncton is the largest city and a transportation and distribution hub for Atlantic Canada. Population growth in Moncton in recent years has been driven by urbanization from French communities in Northern New Brunswick. The Saint John market, representing 5.6% of Killam's apartment NOI, is focused on industry and energy. After strong energy investments in the city in the mid-2000s, the city has seen a reduction in economic projects over the last three years. Home to Irving Oil's refinery operations, the proposed Energy East Pipeline project to bring oil from Western Canada to refineries in Quebec and New Brunswick, has potential for strong economic growth for the city and the province.\nKillam also has a 19% market share in Charlottetown, the capital and economic center of Prince Edward Island.", - "page_start": 32, - "page_end": 32, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Apartment Occupancy by Core Market\nHalifax, NS, 2013.Units = 4,970. Halifax, NS, 2013.Occupancy (1) = 96.0%. Halifax, NS, 2013.Average Rent = $923. Halifax, NS, 2012.Units = 4,822. Halifax, NS, 2012.occupancy (1) = 96.6%. Halifax, NS, 2012.average rent = $889. Halifax, NS, 2012.change occ.(bps) = (60) bps. Halifax, NS, 2012.% change avg rent = 3.8%. moncton, nB, 2013.Units = 1,593. moncton, nB, 2013.Occupancy (1) = 97.1%. moncton, nB, 2013.Average Rent = 831. moncton, nB, 2012.Units = 1,424. moncton, nB, 2012.occupancy (1) = 96.3%. moncton, nB, 2012.average rent = 800. moncton, nB, 2012.change occ.(bps) = 80 bps. moncton, nB, 2012.% change avg rent = 3.9%. Fredericton, nB, 2013.Units = 1,394. Fredericton, nB, 2013.Occupancy (1) = 96.3%. Fredericton, nB, 2013.Average Rent = 896. Fredericton, nB, 2012.Units = 1,293. Fredericton, nB, 2012.occupancy (1) = 97.8%. Fredericton, nB, 2012.average rent = 846. Fredericton, nB, 2012.change occ.(bps) = (150) bps. Fredericton, nB, 2012.% change avg rent = 5.9%. saint John, nB, 2013.Units = 1,143. saint John, nB, 2013.Occupancy (1) = 94.4%. saint John, nB, 2013.Average Rent = 746. saint John, nB, 2012.Units = 1,143. saint John, nB, 2012.occupancy (1) = 93.6%. saint John, nB, 2012.average", - "page_start": 35, - "page_end": 35, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Sensitivity Analysis\nApartments, December 31, 2013.Low = . Apartments, December 31, 2013.High = . Apartments, December 31, 2013.Effective Weighted Average = 5.88%. Apartments, December 31, 2012.low = . Apartments, December 31, 2012.High = . Apartments, December 31, 2012.Effective Weighted average = 6.02%. Halifax, December 31, 2013.Low = 5.15%. Halifax, December 31, 2013.High = 7.00%. Halifax, December 31, 2013.Effective Weighted Average = 5.87%. Halifax, December 31, 2012.low = 5.30%. Halifax, December 31, 2012.High = 7.00%. Halifax, December 31, 2012.Effective Weighted average = 5.85%. moncton, December 31, 2013.Low = 5.56%. moncton, December 31, 2013.High = 8.00%. moncton, December 31, 2013.Effective Weighted Average = 5.94%. moncton, December 31, 2012.low = 6.00%. moncton, December 31, 2012.High = 8.00%. moncton, December 31, 2012.Effective Weighted average = 6.30%. Fredericton, December 31, 2013.Low = 5.15%. Fredericton, December 31, 2013.High = 6.25%. Fredericton, December 31, 2013.Effective Weighted Average = 5.93%. Fredericton, December 31, 2012.low = 5.75%. Fredericton, December 31, 2012.High = 6.50%. Fredericton, December 31, 2012.Effective Weighted average = 6.30%. saint John, December 31, 2013.Low = 6.25%. saint John, December 31, 2013.High = 6.75%. saint John, December 31, 2013.Effective Weighted Average = 6.63%. saint John, December 31, 2012.low = 6.00%. saint John, December 31, 2012.High = 6.75%. saint John, December 31, 2012.Effective Weighted average = 6.45%. st. John's, December 31, 2013.Low = 5.15%. st. John's, December 31, 2013.High = 6.25%. st. John's, December 31, 2013.Effective Weighted", - "page_start": 79, - "page_end": 79, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "2. Social and political landscape\nmore concrete over time is damage control. In a world that produces digital data without interruption, uncontrolled and unpredictable data releases are facts of life that are very hard to predict, practically impossible to avoid and increasingly common. Opening public government data, that is providing plenty of officially verified information, becomes therefore also a damage control solution, to prevent or at least minimize damages from such uncontrolled releases. Without official Open Public Data, individual citizens, political parties or other organizations will start to process and compare (if they already aren't...) data from unofficial sources anyway, maybe from different countries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong conclusions. This is not some theoretical possibility far in the future, as this real world example (from a comment to an Open Data discussion in an italian blog) proves:\n\" on the [non italian] Geonames website you can download geo-referenced data about... 47000 Italian municipalities. That worries me, because there are only 8094 of them. Besides, I grabbed a few random data about population, and I can guarantee you that not one was right. What should be done in such cases?\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they suggest that, considering its current needs and problems, current societies want and need more Open Data than they already have.", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "apartment net operating Income by Core Market\nfor the year ended December 31, 2013\nHalifax | 47% Ontario | 10% Fredericton | 10% Moncton | 10% St. John's | 7% Charlottetown | 7% Saint John | 6% Other | 3%", - "page_start": 3, - "page_end": 3, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "3.6.3. Unequal access\nEven ignoring crime mapping, in some worst case scenarios, data openness may be not only hindered by social divisions, but also create or enhance them. If citizens can't find and recognize real, relevant meaning and practical value in data, as well as way to use them to make change happen, there won't be any widespread, long lasting benefit from openness. How can we guarantee, instead, that such meaning and value will be evident and usable? What are the ingredients for success here?\nEnhancing access to PSI it's harder than it may seem because it isn't just a matter of physical infrastructure. It is necessary that those who access Open Data are in a position to actually understand them and use them in their own interest.\nThis is far from granted also because, sometimes, the citizens who would benefit the most from certain data are just those, already poor, marginalized and/or without the right education, who have the least chances to actually discover and be able to use them. This is what G. Friedman was\n19/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nspeaking about when, in September 2010, he wrote about the great divide caused by Open Health Data:\n[in the USA] \"statistically speaking, chronic disease is associated with being older, African American, less educated, and living in a lower-income household. By contrast, Internet use is statistically associated with being younger, white, collegeeducated, and living in a higher-income household. Thus, it is not surprising that the chronically ill report lower rates of Internet access.\nStarting from this, and commenting a study of the performances, with respect to coronary artery bypass grafting, of several medical centers, Frydman expressed his concern that:\nthe empowered will have access to [this data] and will act upon it, while many of the people suffering from chronic diseases (the same population that would benefit most from access to this information) won't. Over time it is therefore probable that the current centers of excellence will treat an ever growing number of empowered while the centers that currently experience high mortality rates will get worse and worse result, simply because they will treat an ever growing number of digital outliers who haven't the possibility to obtain health data and apply filters.", - "page_start": 18, - "page_end": 19, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "Management's Discussion and Analysis\nLooking to 2014 and beyond, population growth, fuelled in part by the $25 billion, 25-year, Irving Shipbuilding Contract, is predicted to increase demand for rental product and absorb the new supply. In addition, Nova Scotia's offshore oil industry has potential for growth with BP and Shell both launching seismic surveys off the province's coast.\nNew Brunswick's rental market also experienced softness over the last year. As CMHC reported in its Fall 2013 Rental Market Report, the overall vacancy for the province's urban centres was 8.9% for october 2013, 200 bps higher than october 2012. cmHc reported Fredericton as the strongest of the larger centres in new Brunswick, with 6.2% vacancy (compared to 4.0% for october 2012), while the weakest market was saint John, with CMHC reporting 11.4% vacancy in Fall 2013 compared to 8.7% for 2012. CMHC reported Moncton with 9.1% vacancy for October 2013, compared to 6.7% a year earlier, with new supply to the market contributing to the vacancy rise.\nDespite the more challenging rental market in 2013, Killam achieved occupancy gains in all three new Brunswick markets and achieved higher occupancy rates than those reported by CMHC in all New Brunswick markets . Killam has successfully responded to the increased competition in New Brunswick by expanding marketing programs and rental incentives. These incentives include offering one-month free rent on some new leases, allowing for early move-ins or including electricity in the rental rates where this is becoming the norm (most notably in Moncton). Enhanced training of leasing representatives in each of the New Brunswick cities has improved the leasing process for prospective tenants and contributed to increased leasing activity in the summer months and even stronger occupancy in Q4. As noted above, Killam's New Brunswick occupancy levels were well above the market averages, with Fredericton ending the year with 96.3% occupancy, saint John ending the year at 94.4% and moncton at 97.1%.", - "page_start": 36, - "page_end": 36, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Home away from Home\nOn an annual basis, Killam donates six fully furnished apartments to hospitals in Halifax, Saint John, Moncton, Fredericton and Charlottetown. These units are used by families of patients who need to travel away from home for health care.", - "page_start": 19, - "page_end": 19, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Status of Risk Management System\nThe Company defines the risk as 'factors which may prevent the achievement of business objectives,' and tries to identify and evaluate such risks as soon as possible and to take necessary measures to minimize the probabilities that risk materialize and the damages.", - "page_start": 21, - "page_end": 21, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "In these mice, which lumbar levels were the dorsal root ganglion removed from?", - "target_page": 3, - "target_passage": "L3 to L5 DRGs were removed and postfixed for another 2 hours", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "References\n[65] West CA, Davies KA, Hart AM, Wiberg M, Williams SR, Terenghi G. Volumetric magnetic resonance imaging of dorsal root ganglia for the objective quantitative assessment of neuron death after peripheral nerve injury. Exp Neurol 2007;203:22-33.\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after upper limb nerve injury and protective effect of repair: clinical evaluation using volumetric magnetic resonance imaging of dorsal root ganglia. Neurosurgery 2013;73:632-40.\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological automated analysis of biological structures. bioRxiv 2020:648337.\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in dorsal root ganglion neurons following peripheral nerve injury. Neuroreport 2018;29:779-85.\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum AI. Dorsal root ganglion macrophages contribute to both the initiation and persistence of neuropathic pain. Nat Commun 2020;11:264.\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia gelatinosa mediate interaction of signals from primary afferents. J Physiol 2010;588:2065-75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.8. Dorsal root ganglion culture\nDorsal root ganglia were dissected from MrgD CreERT2 ;Ai32 and Calca CreERT2 ;Ai32 mice . 1 week after dosing with tamoxifen and enzymatically digested at 37˚˚C for 80 minutes in dispase type II (4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. 63 Mechanically dissociated cells were plated onto laminin/poly-D-lysine (R&D Systems, Minneapolis, MN) treated coverslips in complete Neurobasal Plus medium (Neurobasal Plus media supplemented with 2% (vol/vol) B27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic-antimycotic [ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth factor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, Cranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor (GDNF, PeproTech) were added to the media under some conditions. Cytosine b -D-arabinofuranoside (4 m M) was added to the media for 24 hours the day after plating to reduce the proliferation of nonneuronal cells. Media was refreshed 3 times per week thereafter. Cultures were fixed for 10 minutes at room temperature with 4% paraformaldehyde and subsequently processed by immunocytochemistry (described earlier).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.6. Tissue clearing and 3D volumetric analyses\nDorsal root ganglia were extracted from animals 4 weeks postSNItrans for whole DRG analyses. In this study, tissue was extracted\nPAIN ®", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed2.pdf" - }, - { - "text": "References\nmouse: marked changes both in cell numbers and neuropeptide expression. Neuroscience 2001;105:249-63.\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional characterization of pulmonary neuroendocrine cells in lung development, injury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531-6.\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of GDNF in the uninjured DRG exerts analgesic effects on neuropathic pain following segmental spinal nerve ligation in mice. J Pain 2011;12: 1130-1139.\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000;422:172-80.\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons: diagnosis and prevention. J Hand Surg Eur Vol 2011;36:730-4.\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, HjerlingLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S, Ernfors P. Unbiased classification of sensory neuron types by large-scale single-cell RNA sequencing. Nat Neurosci 2015;18:145-53.\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997;388:307-12.\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974;248:740-43.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nTo assess the gross loss of neurons from DRG following nerve injury, we generated the Avil FlpO ;Atf3 CreERT2 ;RC::FLTG mouse line in which na¨ıve and axotomized sensory neurons were differentially labelled. In this mouse line, all neurons express tdTomato (Flp-dependent) in the na¨ıve state and switch to expressing green fluorescent protein (GFP) upon axonal damage and concurrent tamoxifen treatment (Flp- and Cre-dependent) ( Figs. 1A and B ). Following pilot experiments to optimize tamoxifen dosing regimen, this approach was both highly efficient and specific (with the caveat that it was necessary to wait for several days after nerve injury for Cre-induced GFP expression): 14 days after SNItrans surgery, GFP was expressed by 99.1 6 0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we observed GFP in only 4.6 6 0.7% of contralateral DRG neurons (Figs. S2A-D, http://links.lww.com/PAIN/C84). We then used a stereological approach to quantify the total number of neurons in L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as well as contralateral to injury. One week after SNItrans, we\nwww.painjournalonline.com\n2867", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nFigure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD ChR2-YFP L4 DRGs4weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3m mintervals through the entirety of 30m m-thick tissue sections. Scale bars 5 100 m m. (C) Quantification of total number of MrgD-YFP 1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach used to generate data presented in (E-G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to injury. White boxes represent regions enlarged in (F). Scale bars 5 100 m m(E) or 20 m m(F). (G) The proportion of FB-labelled DRG neurons decreased after spared nerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; side 3 injury interaction: F 1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests: * P , 0.05, ** P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, FastBlue; RM, repeated measures.\nDecember 2024 · Volume 165 · Number 12", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed2.pdf" - }, - { - "text": "Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury-induced plasticity and pain.\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nP , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green fluorescent protein.\nprotein) neurons 28 days after sham surgery or SNItrans ( Figs. 3A and B ). SNItrans, but not sham, resulted in a significant decrease (54.0 6 6.6%) in the total number of MrgD-YFP 1 neurons in L4 DRG ( Fig. 3C ).\nYellow fluorescent protein expression in MrgD ChR2-YFP mice is driven by the endogenous Mrgprd promotor, which has been reported to be upregulated or downregulated following axonal damage. 44,58 Such changes in promoter activity could affect the proportion of nonpeptidergic nociceptors identified by YFP expression. Therefore, to verify these findings, we used MrgD CreERT2 ;Ai32 mice and tamoxifen administration before injury, to permanently label Mrgprdexpressing afferents with ChR2-YFP ( Figs. 3D-F ). We then tested whether the proportion of cutaneous tibial afferents that were YFP 1 was altered following nerve injury. Following hindpaw FB injection, ; 15% of contralateral, FB-labelled DRG neurons expressed YFP. This was reduced to 6.0 6 1.2% 28 days after SNIcrush injury and to only 1.7 6 0.9%", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.1. Animals\nMice were housed in groups in humidity- and temperature-controlled rooms with free access to food and water, on a 12-hour light-dark cycle, and with environmental enrichment. Animal procedures were performed under a UK Home Office Project Licence and in accordance with the UK Home Office (Scientific Procedures) Act (1986). All studies were approved by the Ethical Review Process Applications Panel of the University of Glasgow or Oxford and conform to the ARRIVE guidelines. Experiments were performed on adult male and female mice aged 7 to 16 weeks at the start of the experiments. All experimental cohorts contained a mix of male and female mice, apart from the cohort of Mrgprd CreERT2 ;Ai32 mice that underwent SNIcrush surgery, which was exclusively female. Details of transgenic lines are provided in Table 1 . Tamoxifen was administered by i.p. injection of 20 mg/mL tamoxifen (Sigma-Aldrich) dissolved in wheat germ oil (doses described in Table 1 ). There were 2 instances where animals were excluded from data analysis: One (cyan fluorescent protein) Thy1-CFP died of unknown causes not related to the procedure and before the experimental endpoint, and one MrgD CreERT2 ;Ai32 exhibited no fluorophore expression and was therefore deemed to have been incorrectly genotyped. Group sizes were based on the extent of neuronal loss 28d following sciatic nerve transection identified by Shi et al. 50 Given a 5 0.05, power 5 0.8, and an effect size of 4.81, power analysis projects that a group size of 3 mice would be needed.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" - }, - { - "text": "References\n[58] Wang C, Gu L, Ruan Y, Geng X, Xu M, Yang N, Yu L, Jiang Y, Zhu C, Yang Y, Zhou Y, Guan X, Luo W, Liu Q, Dong X, Yu G, Lan L, Tang Z. Facilitation of MrgprD by TRP-A1 promotes neuropathic pain. FASEB J 2019;33: 1360-73.\n[59] Wang H, Zylka MJ. Mrgprd-expressing polymodal nociceptive neurons innervate most known classes of substantia gelatinosa neurons. J Neurosci 2009;29:13202-9.\n[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial cell line-derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and prevents the expression of experimental neuropathic pain. Neuroscience 2003; 121:815-24.\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan fluorescent protein (CFP) expressing cells in the retina of Thy1-CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010; 468:110-4.\n[62] Warwick C, Cassidy C, Hachisuka J, Wright MC, Baumbauer KM, Adelman PC, Lee KH, Smith KM, Sheahan TD, Ross SE, Koerber HR. MrgprdCre lineage neurons mediate optogenetic allodynia through an emergent polysynaptic circuit. PAIN 2021;162:2120-31.\n[63] Weir GA, Middleton SJ, Clark AJ, Daniel T, Khovanov N, McMahon SB, Bennett DL. Using an engineered glutamate-gated chloride channel to silence sensory neurons and treat neuropathic pain at the source. Brain 2017;140:2570-85.\n[64] Welin D, Novikova LN, Wiberg M, Kellerth JO, Novikov LN. Survival and regeneration of cutaneous and muscular afferent neurons after peripheral nerve injury in adult rats. Exp Brain Res 2008;186:315-23.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "Did the researcher responsible for quantifying the cells in the dorsal root ganglion know which group each mouse belonged to?", - "target_page": 4, - "target_passage": "During all image quantification, the experimenter was blind to the experimental groups.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "References\n[65] West CA, Davies KA, Hart AM, Wiberg M, Williams SR, Terenghi G. Volumetric magnetic resonance imaging of dorsal root ganglia for the objective quantitative assessment of neuron death after peripheral nerve injury. Exp Neurol 2007;203:22-33.\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after upper limb nerve injury and protective effect of repair: clinical evaluation using volumetric magnetic resonance imaging of dorsal root ganglia. Neurosurgery 2013;73:632-40.\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological automated analysis of biological structures. bioRxiv 2020:648337.\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in dorsal root ganglion neurons following peripheral nerve injury. Neuroreport 2018;29:779-85.\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum AI. Dorsal root ganglion macrophages contribute to both the initiation and persistence of neuropathic pain. Nat Commun 2020;11:264.\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia gelatinosa mediate interaction of signals from primary afferents. J Physiol 2010;588:2065-75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.8. Dorsal root ganglion culture\nDorsal root ganglia were dissected from MrgD CreERT2 ;Ai32 and Calca CreERT2 ;Ai32 mice . 1 week after dosing with tamoxifen and enzymatically digested at 37˚˚C for 80 minutes in dispase type II (4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. 63 Mechanically dissociated cells were plated onto laminin/poly-D-lysine (R&D Systems, Minneapolis, MN) treated coverslips in complete Neurobasal Plus medium (Neurobasal Plus media supplemented with 2% (vol/vol) B27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic-antimycotic [ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth factor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, Cranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor (GDNF, PeproTech) were added to the media under some conditions. Cytosine b -D-arabinofuranoside (4 m M) was added to the media for 24 hours the day after plating to reduce the proliferation of nonneuronal cells. Media was refreshed 3 times per week thereafter. Cultures were fixed for 10 minutes at room temperature with 4% paraformaldehyde and subsequently processed by immunocytochemistry (described earlier).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.6. Tissue clearing and 3D volumetric analyses\nDorsal root ganglia were extracted from animals 4 weeks postSNItrans for whole DRG analyses. In this study, tissue was extracted\nPAIN ®", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed2.pdf" - }, - { - "text": "Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury-induced plasticity and pain.\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "References\nmouse: marked changes both in cell numbers and neuropeptide expression. Neuroscience 2001;105:249-63.\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional characterization of pulmonary neuroendocrine cells in lung development, injury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531-6.\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of GDNF in the uninjured DRG exerts analgesic effects on neuropathic pain following segmental spinal nerve ligation in mice. J Pain 2011;12: 1130-1139.\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000;422:172-80.\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons: diagnosis and prevention. J Hand Surg Eur Vol 2011;36:730-4.\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, HjerlingLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S, Ernfors P. Unbiased classification of sensory neuron types by large-scale single-cell RNA sequencing. Nat Neurosci 2015;18:145-53.\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997;388:307-12.\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974;248:740-43.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nTo assess the gross loss of neurons from DRG following nerve injury, we generated the Avil FlpO ;Atf3 CreERT2 ;RC::FLTG mouse line in which na¨ıve and axotomized sensory neurons were differentially labelled. In this mouse line, all neurons express tdTomato (Flp-dependent) in the na¨ıve state and switch to expressing green fluorescent protein (GFP) upon axonal damage and concurrent tamoxifen treatment (Flp- and Cre-dependent) ( Figs. 1A and B ). Following pilot experiments to optimize tamoxifen dosing regimen, this approach was both highly efficient and specific (with the caveat that it was necessary to wait for several days after nerve injury for Cre-induced GFP expression): 14 days after SNItrans surgery, GFP was expressed by 99.1 6 0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we observed GFP in only 4.6 6 0.7% of contralateral DRG neurons (Figs. S2A-D, http://links.lww.com/PAIN/C84). We then used a stereological approach to quantify the total number of neurons in L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as well as contralateral to injury. One week after SNItrans, we\nwww.painjournalonline.com\n2867", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "1. Introduction\nnerve injury in experimental rodent models. 24,50,53,56 Some studies have suggested that neuron loss occurs in certain patient cohorts, 48,66 but this is yet to be definitively demonstrated in humans. In rodents, most studies support a preferential loss of small cells that give rise to unmyelinated fibers 53 but some contrasting studies describe the preferential loss of large cells 6 or loss of cells of all sizes. 46 Variation is evident across studies in terms of experimental species, age, type of injury, and quantification methods. 56 Shi et al. 50 used stereological counting methods to identify a 54% loss of DRG neuron number 4 weeks after 'mid-thigh' sciatic nerve transection in C57BL/6 mice. Estimates for the degree of loss following commonly used nerve injury paradigms (eg, spared nerve injury [SNI] and sciatic nerve crush) are not available and because of the neurochemical changes following injury and the loss of subpopulation marker gene expression, 5,44,50 the vulnerability of molecularly defined subpopulations has not been characterized. Moreover, more recent studies have cast doubt on the extent or even presence of DRG neuron death following nerve injury. One study which developed a deep learning approach to assess rat DRG cellular plasticity found no loss of neurons up to 2 weeks post-SNI, 49 while another observed no loss of genetically labelled damaged DRG neurons 2 months after sciatic nerve crush. 44\nThe issue of whether neuron loss occurs, and if so, in what subpopulations, is important. It will likely have implications for our understanding of reinnervation and functional recovery in patients. Furthermore, better insight will provide critical context for those investigating the plasticity that occurs following nerve injury and may inform therapeutic targeting of sensory neuron populations.\nAn expanding repertoire of transgenic recombinase driver lines now makes it possible to permanently label DRG neuron subpopulations and study their fate in rodent nerve injury paradigms. The aim of this study was to use this technology to characterize\nwww.painjournalonline.com\n2863\n2864\nA.H. Cooper et al. · 165 (2024) 2863-2876\nneuron loss after nerve injury and to test the hypothesis that loss is not equally distributed across molecular populations.", - "page_start": 0, - "page_end": 1, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nFigure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD ChR2-YFP L4 DRGs4weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3m mintervals through the entirety of 30m m-thick tissue sections. Scale bars 5 100 m m. (C) Quantification of total number of MrgD-YFP 1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach used to generate data presented in (E-G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to injury. White boxes represent regions enlarged in (F). Scale bars 5 100 m m(E) or 20 m m(F). (G) The proportion of FB-labelled DRG neurons decreased after spared nerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; side 3 injury interaction: F 1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests: * P , 0.05, ** P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, FastBlue; RM, repeated measures.\nDecember 2024 · Volume 165 · Number 12", - "page_start": 7, - "page_end": 8, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\ninjury (Fig. S6A-C, http://links.lww.com/PAIN/C84), indicating that any loss of neurons within specific neuronal subpopulations wasnot biased towards soma size. Collectively, these data show that unrepaired axonal damage to peripheral sensory neurons induces a partial loss of Trpm8 1 and CGRP 1 subpopulations, but no major loss of myelinated afferents.\nBased on our findings of preferential loss of nonpeptidergic nociceptors, we re-analyzed a previous population-specific transcriptomic dataset of mouse DRG neurons following nerve injury for potential upregulation of cell death pathways (Fig. S7, http://links.lww.com/PAIN/C84). 3 Wefound that early after injury (3 days post-SNItrans), nonpeptidergic (MrgD CreERT2 -expressing) neurons showed enhanced enrichment of GO terms associated with apoptosis, in contrast to a broad population of nociceptors (labelled with Scn10a CreERT2 ), peptidergic nociceptors (CalcaCreERT2 ), C-LTMRs (Th CreERT2 ), and A b -RA (rapidly adapting) and A d -LTMRs (A d /A b -LTMR, Ntrk2 CreERT2 ;Advillin FlpO ), in which there was less or no enrichment of cell death pathways. By 4 weeks, only C-LTMR and A d /A b -LTMR subtypes show any overrepresentation of cell death pathways (in the populations studied). Both injury-specific and apoptotic signatures in nonpeptidergic neurons were no longer significantly enriched, consistent with a loss of axotomized nonpeptidergic afferents by this late timepoint postinjury. These data suggest that apoptotic pathways are upregulated acutely after injury in a celltype-specific manner.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed2.pdf" - }, - { - "text": "References\n[58] Wang C, Gu L, Ruan Y, Geng X, Xu M, Yang N, Yu L, Jiang Y, Zhu C, Yang Y, Zhou Y, Guan X, Luo W, Liu Q, Dong X, Yu G, Lan L, Tang Z. Facilitation of MrgprD by TRP-A1 promotes neuropathic pain. FASEB J 2019;33: 1360-73.\n[59] Wang H, Zylka MJ. Mrgprd-expressing polymodal nociceptive neurons innervate most known classes of substantia gelatinosa neurons. J Neurosci 2009;29:13202-9.\n[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial cell line-derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and prevents the expression of experimental neuropathic pain. Neuroscience 2003; 121:815-24.\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan fluorescent protein (CFP) expressing cells in the retina of Thy1-CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010; 468:110-4.\n[62] Warwick C, Cassidy C, Hachisuka J, Wright MC, Baumbauer KM, Adelman PC, Lee KH, Smith KM, Sheahan TD, Ross SE, Koerber HR. MrgprdCre lineage neurons mediate optogenetic allodynia through an emergent polysynaptic circuit. PAIN 2021;162:2120-31.\n[63] Weir GA, Middleton SJ, Clark AJ, Daniel T, Khovanov N, McMahon SB, Bennett DL. Using an engineered glutamate-gated chloride channel to silence sensory neurons and treat neuropathic pain at the source. Brain 2017;140:2570-85.\n[64] Welin D, Novikova LN, Wiberg M, Kellerth JO, Novikov LN. Survival and regeneration of cutaneous and muscular afferent neurons after peripheral nerve injury in adult rats. Exp Brain Res 2008;186:315-23.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "Does the Oxbridge Academy have a guide on how to apply to college?", - "target_page": 21, - "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Did you enjoy reading this book?\nJoin our online social community and share your opinion:\nwww.facebook.com/oxbridgeacademysa twitter.com/oxbridgeEdu www.linkedin.com/company/oxbridge-academy\nOxbridge Academy is an established distance learning college offer -ing skills courses, national qualifications, and internationally recognised courses to students in South Africa and abroad.\nWith our head office in Stellenbosch in the Western Cape, we cater to our students' needs by recruiting industry-expert tutors to provide academic assistance via telephone and e-mail, as well as by designing our study material in such a way that it is clear, simple, and easy for our students to understand.\nWith us, studying from home is easy, affordable, and convenient.", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "IMPROVE YOUR MARKS!\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 41, - "page_end": 42, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "TIPS FOR FILLING IN YOUR COLLEGE REGISTRATION FORM\nApplying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a daunting experience. Not only do you need to choose a course, but you also need to make sure that you:\n· meet the entry requirements\n· meet the deadlines\n· fill in the forms correctly\n· send the forms to the right address\n· include all the necessary attachments\nTo make the college registration process easier for you, we've compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general tips that will be relevant to the application and registration processes at other colleges.", - "page_start": 20, - "page_end": 20, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "1. Read (and follow) the instructions carefully.\nIf you are an Oxbridge Academy student, the general assignment guidelines will be provided in your 'Success' Study Guide. Specific instructions will also be included at the beginning of each of your assignments.", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Be clear and concise.\nMake sure that your tutor will be able to understand what it is that you are asking.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 33, - "page_end": 34, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 4 - PAY YOUR REGISTRATION FEE AND SEND IN YOUR FORM\nDifferent courses have different registration fees. Please check the course fees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to find out how much you need to pay to register for your chosen course, and pay this amount using the banking details provided at the bottom of the registration form. Remember to attach your proof of payment.\nIf you are under the age of 18, your parent or guardian will need to sign this section of the form to state that they are aware of your registration with Oxbridge Academy, and that they do not have any objections. If you are unemployed, you will need a guarantor to sign this section of the form. Your parent or guarantor will be held responsible if you miss any of your payments in relation to your course fees.\nDeveloped for Oxbridge Academy\n3\nBasic English Language Skills\n4\nSend your registration form to the registrations office at Oxbridge Academy via one of the following channels:\nFax:\n086 262 5550\nPost: PO Box 12723, Die Boord, 7613 E-mail: registrar@oxbridgeacademy.co.za\n6\nBasic English Language Skills", - "page_start": 25, - "page_end": 27, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "There are 4 steps you need to follow when you want to register as a student at Oxbridge Academy:\n1. Select Your Course\n2. Fill in Your Student Details\n3. Select Your Delivery Option\n4. Pay Your Registration Fee and Send in Your Form\nBasic English Language Skills", - "page_start": 20, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Distinguish:\nClearly identify the differences between ideas, facts or views.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 39, - "page_end": 40, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 1 - SELECT YOUR COURSE\nOxbridge Academy Short Course: Marketing Management\nADV101\nBefore you start filling in the registration form, you need to choose your course. Once you've identified the course that you would like to study, remember to check that you meet the entry requirements.\nYou can find the course name and course code for your chosen course on the relevant detailed course information page on our website. Have a look at the example in the screenshot below (the course name and course code are circled in red):\nPlease make sure to check the accreditation status of your chosen course. Some of our courses are non-credit bearing skills development courses, which are neither accredited by external bodies nor registered on the NQF. Please go to our website: oxbridgeacademy.co.za for more information about our skills development courses.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 21, - "page_end": 22, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "IN THIS E-BOOK, WE'LL BE HELPING YOU TO:\n· Develop your basic English language skills.\n· Improve your English grammar.\nApply your language and communication skills in a business contexT. ( www.oxbridgeacademy.co.za/find-a- course/business-administrationcourses/)\n'Grammar is a litmus test. If job hopefuls can't distinguish between 'to' and too', their applications go into the bin'\nKyle Wiens, CEO of iFixit\n'Grammar often seems to be a low priority in education. Are school undervaluing grammar, given that employers may rule out applications with sloppy writing?'\nThe New York Times\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 5, - "page_end": 6, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "I have trouble writing effective summaries in English, do you have any tips?", - "target_page": 29, - "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "LANGUAGE SKILLS AT WORK HOW TO WRITE A COVER LETTER\nIf you've ever applied for a job, you'll know that writing the cover letter is the most difficult part of almost any job application. Your cover letter creates the first impression, and often determines whether an employer will even look at your CV.\nYou need to use this opportunity to introduce yourself and your skills, and to set yourself apart from all the other candidates. You can also use this opportunity to explain any gaps in your CV, and to motivate why you are the right person for the job.\ntips tips tips tips tips tips tips tips tips\nBasic English Language Skills", - "page_start": 44, - "page_end": 45, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "TABLE OF CONTENTS:\n1. General Language Tips to Get You Started\n2. Parts of Speech\n3. Punctuation\n4. Commonly Confused Words and Phrases\n5. Tips for Filling in Your College Registration Form\n6. Learn How to Summarise Your Study Material\n7. How to Ask for Help from Your Tutor\n8. Tips for Completing Your Written Assignments\n9. Tips for Answering Exam Questions\n10. Language Skills at Work - How to Write a Cover Letter\n11. Language Skills at Work - How to Write a Resignation Letter\n12. Language Skills at Work - Sending E-mails to Your Colleagues\nBasic English Language Skills", - "page_start": 2, - "page_end": 3, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "To start off with, here are a few tips for improving your general language and communication skills:\n1. Read as much as possible. Reading improves your vocabulary, and helps you to become familiar with sentence structure, word order, and the correct use of punctuation.\n2. Invest in a good dictionary. When you are unsure of the meaning of a word, or when you come across an unfamiliar word, make sure to look it up in your dictionary.\n3. Keep a journal. This will give you an opportunity to practice your writing skills on a regular basis.\nBasic English Language Skills", - "page_start": 6, - "page_end": 7, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Summarise:\nGive the main points\nBasic English Language Skills", - "page_start": 40, - "page_end": 41, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "General Tips for Making Summaries\n· Underline or highlight key points as you work through your study material, and make notes.\n· When you come across a word or concept you don't understand, look it up in a dictionary, or do some research on the concept, and add your own definition to your summary.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 31, - "page_end": 32, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "10. For longer questions and essay-style questions: plan your answers before you start writing.\nThis will help you to formulate logical arguments, as well as to structure your answers clearly. In essay questions, you will get marks for using the correct format, which includes making sure that you have an introduction, sub-headings and paragraphs, and a conclusion.", - "page_start": 43, - "page_end": 43, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Do the following:\n25. Create a mind map to summarise Chapter 7 (How to Ask for Help from Your Tutor). (5)\n26. List 3 things you need to do if you want to earn good marks for your written assignments. (3)\n27. List 5 important things to keep in mind when writing a cover letter.\n(5)\n28. List 5 of the things that you should include in a resignation letter.\n(5)\n29. List 3 methods you can use to summarise your study material. (3)\n30. Give 2 examples of how good language skills can benefit your ca -reer. (2)\n31. Complete the following sentence:\nSummarising your study material gives you the opportunity to\nDeveloped for Oxbridge Academy\nBasic English Language Skills", - "page_start": 57, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "GENERAL LANGUAGE TIPS TO GET YOU STARTED\nThis chapter focuses on the importance of language skills in the workplace, and covers basic tips for how you can improve your command of the English language.\n'The English language is nobody's special property. It is the property of the imagination. It is the property of the language itself'\nDerek Walcott\nDeveloped for Oxbridge Academy\nBasic English Language Skills\nWhen we think about our careers, and what we need to do to establish them, we often forget about the need to develop an essential skill: communication. If you start reading through the job descriptions in a industry, you will find that the vast majority of jobs require one or more of the following:\n· Effective communication skills\n· Interpersonal skills\n· Ability to work in a team\n· Negotiation skills\n· Conflict resolution skills\n· Report writing skills\nWhat all of these skills have in common is that they involve the use of language to achieve a particular purpose. And for this reason, having good language skills is essential in any working environment.", - "page_start": 3, - "page_end": 4, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "TIPS FOR ANSWERING EXAM QUESTIONS\nYou're sitting at a table in a room full of students, hunched over your exam paper, with your pen in hand. Your brain feels fried, and your hand is starting to cramp. You look at the clock, and you realise that you have only ten minutes left to answer Question 5b - which counts for 50 marks.\nExams can be a stressful experience. To help reduce the stress and anxiety surrounding exams, and to help you achieve the best possible marks, we've compiled a list of exam-writing tips for you.", - "page_start": 41, - "page_end": 41, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Share knowledge\nTeamwork is all about collaboration! Share with your team best practices you learn along the way, tips and tricks for how you can best organize your workflows and ask for their own advice to define how you can best use Teams together.", - "page_start": 5, - "page_end": 5, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "Is exposure to risk factors that may affect mental wellbeing at work comparable across European countries?", - "target_page": 25, - "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "3.1 Psychosocial risks at work\nDuring the last 30 years, the scientific, political and practical discussions on psychosocial risks and preventive measures against psychosocial risks have gained strong importance. After a period of doubts and resistance, today they are regarded as risks of the same severity as the classical physical safety and health risks. 4 (Chapter 1 covers the psychosocial risk aspect; for the prevalence of mental diseases and the burden of mental diseases see Chapter 2.2. 5 )\nLooking at the steady increase of certain psychosocial risk indicators at workplace level, either the risks have increased and/or the number of people working in occupations with higher psychosocial risks has increased. 6,7 This is valid, for example, for the indicator time pressure, for example, in delivery services, transport, and often also clerical work; the workforce has grown in sectors where emotional demands from dealing with difficult clients, customers, pupils or patients are common; there are also more workers employed (or self-employed) in interactional occupations, for example, in call centres, or in occupations with a high level of emotional tensions, for example, education, health and care.\nFigure 2: Risk factors that can adversely affect mental wellbeing - EWCS 8 and ESENER 9\nA major difference between the ESENER and the EWCS survey is the respondent. In ESENER those persons who are most familiar with OSH or responsible for OSH in an enterprise were asked whether a certain risk factor exists in the enterprise; in the EWCS survey workers themselves were asked whether they are exposed to a risk factor.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n24\nOccupational safety and health in Europe - state and trends 2023\nIn 2007, 2013 and 2020, Eurostat asked employed persons in its ad hoc surveys to the Labour Force Survey (LFS) whether they had '… exposure to risk factors that can adversely affect mental wellbeing' . 10 In 2007 and 2013, the questions covered four items (time pressure and overload of work, violence or threat of violence, harassment and bullying, other factors). In the 2020 survey, 11 'Mental well-being' was operationalised by an additional four response options, resulting in a total of eight options: 12", - "page_start": 23, - "page_end": 24, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1 Psychosocial risks at work\n1. Severe time pressure or overload of work;\n2. Violence or threat of violence;\n3. Harassment or bullying;\n4. Poor communication or cooperation within the organisation;\n5. Having to deal with difficult customers, patients, pupils etc.;\n6. Job insecurity;\n7. Lack of autonomy, or lack of influence over the work pace or work processes; and\n8. Another significant risk factor for mental well-being.\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely affect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less. 13\nEuropean Agency for Safety and Health at Work - EU-OSHA\n25\nOccupational safety and health in Europe - state and trends 2023\nFigure 3: 'Exposure to risk factors adversely affecting mental wellbeing' - LFS Ad hoc survey 2020 14\nESENER 2019 reveals that several psychosocial risk factors are reported to be present in a significant share of establishments in the EU27, namely having to deal with difficult customers, patients and pupils (59%) and time pressure (45%).\nThe aspects 'Difficult clients', 'Poor communication' and 'Long working hours' are major psychosocial risks. The increase of workforce in communicative and client-oriented occupations - social work, education, tourism and entertainment, health and care - during the last 30 years adds to the conventional work with clients in service, sales and health occupations.\nThe next table shows the top seven EU Member states with the highest share of these risks for all sectors and for the sector 'Human health and social work activities' (HHSW).\nTable 1: Psychosocial risks, Top countries 'All Sectors' and 'Human health and social work' - ESENER 2019\nDifficult customers, patients and pupils ('clients') seem to be the most widespread psychosocial burden, with workers in Portugal, Malta and Cyprus are most exposed. In the sector HHSW, eastern European countries are much more present, Slovenia at the top, followed by Portugal, Estonia, Poland and Bulgaria.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n26\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 24, - "page_end": 26, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "2.4. Mental and behavioural disorders\n· 2.4.1. Post-traumatic stress disorder\n· 2.4.2. Other mental or behavioural disorders not mentioned in the preceding item where a direct link is established scientifically, or determined by methods appropriate to national conditions and practice, between the exposure to risk factors arising from work activities and the mental and behavioural disorder(s) contracted by the worker\nAnd there are also emerging and new risks where health data will not be available until a certain number of workers are exposed for quite a while . Some prominent examples are nanotechnologies, the significant increase of new chemically based technologies, vision impairment due to long hours of work under artificial light at the same distance with small digital equipment, 183 more exposure to 'global' biological agents due to more interactional tasks, and travel and transport between countries and continents. On that note, the Covid-19 pandemic could also be used as an example. In 2022, the Commission proposed an update of the Recommendation on the ESOD to recognise Covid-19 as an occupational disease for workers particularly concerned: health and social care, home help or where there is a proven risk of infection (during a pandemic) in other sectors 184 .\nIt adds to these difficulties that workers are often not only exposed to one disease causing exposure but to several exposures at the same time (exposure is understood here in a broad sense: ranging from long working hours over postures and movements to harassment and violence and to noise and chemical and biological substances, etc.). In theory, a single risk - if below the threshold limit values and in line with legislation and standards will not cause harm - given that it is the only exposure . The impact of this single exposure is not strong enough to generate a disease on the level of severity of a recognised occupational disease. A combination of several risks might add several exposures, worsen the impact and cause serious harm.\nQuite well studied is the increased prevalence of musculoskeletal diseases, if not only ergonomic risks but also high psychosocial risks are prevalent at the workplace. 185 Research has also found unexpected connections like the synergistic effect of noise and certain chemicals on hearing impairments. Such outcomes of multi-risk profiles are often particularly difficult to identify and understand. Obviously, most sectors and occupations involve workplaces with multi-risk profiles . Some prominent major risks in certain sectors or occupations are:", - "page_start": 75, - "page_end": 75, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.6 Conclusions\nThe exposure to psychosocial risks is increasing, with mental health prevalence still emerging. Major work-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, longer working hours and poor communication. There is also some evidence that countries with overaverage employment in sectors like health and care or other human and client-oriented services (education, social work, tourism, entertainment) suffer from longer working hours and more mental burden. The northern countries are at the top of the countries with highest mental burden. The southern countries have a high share of specific psychosocial risks related to work in tourism and entertainment, characterised by atypical working times and issues with difficult clients.", - "page_start": 58, - "page_end": 58, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3 Status of working conditions\nThis chapter on health and safety-related working conditions provides an overview on status and development of working conditions; it is mainly based on the indicators that were selected for the data visualisation in the OSH Barometer . This is a quite limited selection of major data; in surveys and statistics many more indicators on working conditions are provided, particularly at national level.\nPractically all working conditions influence mental health , that is, they involve psychosocial risks , and all also involve 'physical risks' , including safety aspects of these risks. Mental health risks are illustrated in the OSH Barometer by datasets on time pressure, poor communication, dealing with difficult clients, discrimination and harassment, and similar. Physical risks include datasets on accidents at work, exposures to chemical and biological substances, exposure to noise, vibrations, high or low temperatures, and working tasks with ergonomic risks, like carrying, lifting heavy loads or work in tiring or painful positions; and also permanent physical inactivity, mainly sitting or long standing. 2\nThe figure below shows the percentage of enterprises reporting OSH risks 'present in the establishment', compared between 2014 and 2019 (ESENER) and covering mental and physical risks. 3\nFigure 1: Risk factors present (% of establishments) - ESENER 2014 and 2019\nNote: Prolonged sitting was a new item in the 2019 survey.\nBetween 2014 and 2019, some risk factors increased, like 'Repetitive hand and arm movements', 'Lifting or moving people of heavy loads', and 'Having to deal with difficult customer, patient and pupils; many others showed no changes, like 'Risk of accidents with machines or hand tools', 'Chemical or biological substances', and 'Loud noise', or minor decreases like 'Risk of accidents with vehicles'.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n23\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 22, - "page_end": 23, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Wellbeing and health\nExisting concepts of wellbeing cover more aspects of work than working conditions or safety and health at work. Eurofound mentions as the most relevant components: income, working time arrangements, possibilities for skills development and career advancement, and the degree of individual control over work.\nILO defines wellbeing at work under the term 'Workplace Wellbeing' : 'Workplace Wellbeing relates to all aspects of working life, from the quality and safety of the physical environment, to how workers feel about their work, their working environment, the climate at work and work organization. The aim of measures for workplace well-being is to complement OSH measures to make sure workers are safe, healthy, satisfied and engaged at work.'\nA common methodology to collect data on health status and wellbeing is self-reporting and selfassessment of risks at work, health risks and health problems, absence, job satisfaction and working life perspectives from a health point of view. This allows insight into the subjective assessment of health risks at work and wellbeing.\nIndicators on wellbeing and satisfaction at work show similar patterns to health and work accidents. Sectors with high physical demands and high customer and client orientation and occupations with a lower skill level report lower wellbeing and satisfaction levels; they report a good health status but fewer expectations to be able to work in this occupation until the age of 60 years. Concerning the levels of self-reported 'Health at risk' , the LFS Ad hoc module on 'Accidents at work and other work-related health problems' suggests that the situation has improved. According to the LFS, in 2007 14.6% of employed persons reported a work-related health problem; this figure decreased in 2013 to 8.8% and went slightly up again - during the pandemic - to 10.3% in 2020 (EU27 level).\nEuropean Agency for Safety and Health at Work - EU-OSHA\n13\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 12, - "page_end": 13, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1 Psychosocial risks at work\nConcerning the complaints about poor communication and cooperation within the organisation, all three Nordic EU Member States are represented in the seven countries with the highest burden, together with several central European countries. This is valid for both selected groupings, 'All sectors' and 'HHSW'.\nRegarding long or irregular working hours , we see a mix of countries from all regions. The order of countries in the sector HHSW - a mixture of countries from the East, South and North - is probably due to specific sectoral regulations of working times. Sweden is at the top in HHSW with 57%, followed by Denmark, Cyprus, Latvia and Czechia, all between 44% and 48%.\nMany analyses of psychosocial risks include other relevant factors like decision latitude (or decision authority) and skill discretion (level of skill and creativity required on the job). In a long-term analysis of the responses to the EWCS between 1995 and 2015, the authors conclude: 15\n'Our findings suggest that work stress generally increased from 1995 to 2015, and that the increase was mostly driven by psychological demands. People working in lower-skilled occupations had generally higher levels of job strain and effort-reward imbalance, as well as they tend to have a steeper increase in job strain than people working in higher-skilled occupations. Most of the change occurred from 1995 to 2005.'\nAccording to this study, the differences between the skills groups are significant, below illustrated for the development of 'Psychological demands' and 'Job strain' ; for these two indicators high-skilled and low-skilled manual workers are at the top of the scale.\nFigure 4: Psychosocial risk factors - Differences between skill groups (Job strain)\nEuropean Agency for Safety and Health at Work - EU-OSHA\n27\nOccupational safety and health in Europe - state and trends 2023\nFigure 5 : Psychosocial risk factors - Differences between skill groups (Psychological demand)\nRegarding the other two analysed indicators, decision authority and skill discretion , the clerical workers show higher levels (a positive outcome) and both manual worker groups are at the lowest level.\nFigure 6: Psychosocial risk factors - Differences between skill groups (Decision authority)\nEuropean Agency for Safety and Health at Work - EU-OSHA\n28\nOccupational safety and health in Europe - state and trends 2023\nFigure 7: Psychosocial risk factors - Differences between skill groups (Skill discretion)", - "page_start": 26, - "page_end": 28, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "It is somewhat surprising that a lack of awareness among management and staff seems to increase with establishment size.\nThe types of risks included in risk assessments are related to the risk profiles of different sectors, for example, it is likely that risk assessments in heavy industries and manual occupations focus more on safety risks. However, while sectoral risk profiles will naturally bias the identification of risks, smaller establishments seem to have less of a focus on MSDs or psychosocial risk factors , which would suggest that they are less well recognised or understood, in particular for MSEs. 415 Establishments also report that psychosocial risk factors are more difficult to manage than other OSH risks, while as business size grows, so does the proportion of respondents who perceive psychosocial risks as more difficult to manage than other OSH risks. 416\nESENER 2019 shows that a reluctance to talk openly about these issues seems to be the main difficulty for addressing psychosocial risks (60% of establishments in the EU27). This, as with all the other difficulties considered (lack of awareness among staff/management and lack of expertise or specialist support), is reported in all enterprise sizes but more frequently as establishment size grows.\nSpecifically, among those establishments that report having to deal with difficult customers, patients or pupils, 51% of those employing 20 or more workers report having a procedure in place to deal with possible cases of threats, abuse or assaults by clients, patients or other external persons. This share rises to 74% among establishments in human health and social work activities.\nThe development of concrete outputs such as measures to better manage risks that can result in musculoskeletal diseases has actually seen a decline between 2014 and 2019, as follows:\n· 85% to 77% on the measure of 'provision of equipment to help with the lifting or moving of loads or other physical heavy work'; 417\n· 73% to 67% concerning 'provision of ergonomic equipment'; and\n· 66% to 60% regarding 'encouraging regular breaks for people in uncomfortable or static postures including prolonged sitting'. 418\nEuropean Agency for Safety and Health at Work - EU-OSHA\n128\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 127, - "page_end": 128, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "References and notes\n47 Adăscăliței et al., 2021: The intensification of work in Europe: A multilevel analysis\n48 EU-OSHA, 2002: Report - New forms of contractual relationships and the implications for occupational safety and health (p. 7).\n49 Eurofound, 2011: Impact of subcontracting on working conditions\n50 Koranyi et al., 2018: Precarious employment and occupational accidents and injuries - a systematic review\n51 ILO Indicator description: Occupational injuries\n52 See the diagrams and country data in the OSH Barometer under: https://visualisation.osha.europa.eu/oshbarometer/\n53 Tynes et al., 2017: Physical working conditions as covered in European monitoring questionnaires 54 EU-OSHA: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3) - first findings, 2019, p. 3 and ESENER Data visualisation, section 'Comparisons 2014-2019', section 'Risk factors present in the establishment', Export data\n55 EU-OSHA calculations based on EWCS raw data.\n56 Eurostat, LFS Ad hoc modules: Persons reporting exposure to risk factors that can adversely affect physical health by sex, age and factor\n57 In the LFS-survey the respondents had to decide which of 11 possible risk factors is the most 'serious one'. Quote: 'Eurostat proposed to implement the exposure to risk factors for physical health at work by using one question that strictly reflects the variable or twelve questions asking for the presence of any of the eleven risk factors and then ask for the most serious one.'\nIn the EWCS and ESENER all reported risk factors were registered.", - "page_start": 142, - "page_end": 142, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "References and notes\n1 OSH Barometer data visualisation tool: https://visualisation.osha.europa.eu/osh-barometer\n2 Methodological remark: Many workers in the service sectors have similar physically demanding work like workers in manufacturing, construction and agriculture. The statistical assignment of enterprises of a certain type to the service sectors and the sectors industry/construction/agriculture is a too rough approach to describe and analyse working conditions, particularly if more detailed data on working conditions are available. For that reason, when talking about health outcomes, in this report often more informative categories are used, for example, managerial jobs (LFS, Eurostat terminology), or high-, medium- and low-skilled clerical work (EWCS), or high-skilled manual and low-skilled manual work (Eurostat), independent on the sector where this work is performed.\n3 EU-OSHA - European Agency for Safety and Health at Work: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3), ESENER Data visualisation, section 'Comparisons 2014-2019'; for 'Prolonged sitting' value from 'Data visualisation 2019' not from 'Comparisons'.\n4 Some of the very first OSH regulations on psychosocial risks at workplaces were issued by Denmark in the early 1980s, dealing with monotony at work, stress, risk of violence at work and risks of working alone.\n5 Psychosocial risks are regarded as reason, and mental health/disease as consequence or outcome of these risks.\n6 OSHWiki, 2022: Psychosocial issues - the changing world of work; OSHWiki, 2022: Psychosocial risks and workers health\n7 EU-OSHA, 2007: Expert forecast on emerging psychosocial risks related to occupational safety and health data for 2015: Eurofound: European Working Conditions Survey - Data Visualisation; Data for 2005: Eurofound:\n8 Eurofound, 2017: Sixth European Working Conditions Survey - Overview report (2017 Update) (p. 48). Raw Fourth European Working Conditions Survey\n9 EU-OSHA: ESENER Data visualisation, Comparisons 2014-2019.\n10 Due to the change of possible response items, the data for the three surveys cannot be compared; the number of mental risk factors increased from three in 2007 and 2013 to eight in 2020.\n11 Eurostat, 2021: EU labour force survey 2020 module on accidents at work and other work-related health problems : assessment report : 2021 edition", - "page_start": 140, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "Has the average working week for employees working full-time decreased since 2006?", - "target_page": 31, - "target_passage": ". The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "3.1.1 Working time in hours and at atypical times\nConcluding, it can be stated that there is a slight trend towards a reduction of weekly working hours for regularly employed workers, including a stable commuting time. Working hours at atypical times show a mixed picture. Looking at most types of employees, atypical working time decreased, except work on Sundays . For self-employed with employees, the working time at atypical hours is in general at a higher level. The number of employees in night work is decreasing. More employees in service and client-related occupations at night or in shifts but also here the atypical times are slightly decreasing.\nProbably these changes mirror the structural economic changes , that is, the shift of workforce between sectors. Night work was common in many industries as part of a three 8-hours shifts, not only in industries with permanent production processes (steel, chemicals, etc.). 27 Moreover night work is and was common in essential services like health, transport, technical infrastructure and security. The\nEuropean Agency for Safety and Health at Work - EU-OSHA\n32\nOccupational safety and health in Europe - state and trends 2023\nnumber of workers in industry decreased, but the number of workers in the above-mentioned service sectors increased.", - "page_start": 31, - "page_end": 32, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1.1 Working time in hours and at atypical times\nToo many hours of working time and/or working hours at atypical or unsocial times can put the mental and the physical health of humans at risk. It is also regarded as a major contributing factor to work accidents , due to fatigue or exhaustion. 16\nThe main indicator to describe working time is the number of the weekly average working hours of full-time employees. However, regarding its impact on health and safety, other aspects of working time are of the same relevance :\n· How long is the average working day?\n· At which times and days is this work done (typical, atypical times)?\n· How often do long working hours take place?\n· Is the work split between two jobs?\n· How flexible are start and end?\n· How intense is the work during this time (breaks, deadlines)?\n· Which groups of workers have standard working times and which do not (e.g. depending on the sector or the type of contract, e.g. sub-contracted workers or self-employed)?\nThere is a slight trend towards fewer working hours for full-time employees (not 'Employed persons') in the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, a decrease of approximately 15 minutes. 17\nRegarding the weekly hours, there are no striking differences between the EU27 Member States. In 2019, Cyprus, Austria and Malta with a high share of workers in the sector of tourism (accommodation) had the highest number of working hours per week (above 41 hours), and Denmark, the Netherlands and Italy the lowest number (39 or fewer) (full-time, employees, 15-64 years, all NACE codes). 18\nEuropean Agency for Safety and Health at Work - EU-OSHA\n29\nOccupational safety and health in Europe - state and trends 2023\n'Bakers are craftsmen, working mostly at night, unlike other craftsmen who, once their work during the day is done, can grasp sleep, and by this renew the worn-out forces. The bakers are the whole night rushing about, and then, for most of the day, they are forced to indulge in sleep, just like those animals hiding from the sun (Solifugae). Therefore, in the same city there are Antipodes, men who live a life that is contrary to that of others.'", - "page_start": 28, - "page_end": 29, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1.1 Working time in hours and at atypical times\nThe length of the daily or weekly working time, its allocation over the 24 hours of a day or at night are important factors for health and wellbeing. The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019. 22 The data also document slight increases and decreases of work at atypical times (response option for frequency: 'usual'). 23 In 2006 and 2019, the following percentages of all employed persons worked at atypical times: on Saturdays the percentage decreased from 28% to 25%, working on Sundays remained stable at around 13.5%, working in the evenings decreased from 19% to 15%, work at night fell from 7% to 5% and shift work increased slightly from 17% to 18%. 24\nEuropean Agency for Safety and Health at Work - EU-OSHA\n31\nOccupational safety and health in Europe - state and trends 2023\nFigure 9: Average working time and work during unsocial hours - Eurostat LFS\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with a high share of process-based industries, reports that 15.0% of its workforce is working at night and 29% in shifts; for the EU27 this rate is 5.2% respectively and 18.3%. 25 Regarding work on Sundays three other countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18% and 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like transport, tourism and agriculture. 26\nFor all these types of work it should be take into account that other groups of workers under nonstandard types of employment contracts (self-employed, agency workers, students, pensioners, undeclared workers) might have taken over work at these atypical working times.", - "page_start": 30, - "page_end": 31, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "References and notes\n20 Eurostat definition: The atypical work distinguishes between 'evening or night work', 'Saturday or Sunday working', and 'shift work'. Data for 2020 are available but indicate a strong reduction of atypical working times, the reason is probably that sectors with a high rate of atypical working times like tourism, transport, entertainment, hotels and restaurants could not work as in previous years, and also production lines in industry, often shift work, were stopped.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n141\nOccupational safety and health in Europe - state and trends 2023\n21 Eurostat: Ad hoc module 2019 on work organisation and working time arrangements. Employment at an atypical working time (time period start with 2011), here and here\n22 Eurostat Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2). here Filter: Employees, Full-time, All NACE, EU27 2019 Q4.\nEurostat Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here Filter: Employees, Full-time, All NACE, EU27 2019 Q4.", - "page_start": 140, - "page_end": 141, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Working conditions - Risk factors at work\nA certain ergonomic risk of many administrative and supervisory jobs is physical inactivity (61%), in practice meaning sitting most of the working time in front of digital equipment, sitting to make phone calls or sitting in meetings. Not only administrative tasks but also many occupations in transport and industry require prolonged sitting (transport, cashiers, parts assembly, etc.).\nIn the 10-year period before 2005, EU-wide surveys found a significant increase in work intensity. Major differences in work intensity and working time patterns can be seen between occupations, forms of work, sectors and enterprise size, for example. The length of the daily or weekly working time and its allocation with the 24 hours of a day or at night are important factors for health and wellbeing. The Eurostat data show a slight decrease in the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.\nEurostat reports for all types of 'employment at atypical working time' a minor decrease between 2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such atypical time. The data also document slight increases or decreases of the different types of work during atypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings decreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell from 7% to 5%, and shift work increased slightly from 17% to 18%. Some groups of self-employed show a higher rate of atypical working times: for high-managerial self-employed , this rate is 43.2% and for low-managerial self-employed 64.5%.\nSignificant differences also exist between eastern/southern and central/northern/western European countries. More physical and ergonomic risks (except inactivity) are reported from eastern and southern EU Member States but more emotional demands (e.g. difficult clients, poor communication and long working hours) in northern and central European countries. One of the major reasons might be the reallocation of industrial production to eastern countries after the EU extension to 24 and later to 27 Member States.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1.1 Working time in hours and at atypical times\nRamazzini, 1713: De Morbis Artificum Diatriba.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n30\nOccupational safety and health in Europe - state and trends 2023\nFigure 8: Hours worked per week of full-time employment, EU27 - Eurostat\nThe commuting time between home and workplace is quite stable; in 2005 at EU27 level, it stood at 42.4 minutes, and in 2015 Eurostat reports 40.2 minutes (time for both ways, to the workplace and back). 19\nWork at atypical working times is in general regarded as a working condition with negative health impact, called work extensity . The two major indicators of atypical working times are work at 'atypical working times' and 'long working hours' .\nEurostat reports for 'Employment at atypical working time' 20 a minor decrease between 2011 and 2019, from 38.8% to 37.2% (EU27), for all employed workforce and all types of such atypical time. 21 Some groups of self-employed show a higher rate of atypical working times but also for most of the categories of self-employed the rates decreased during the period 2011 to 2019. High managerial selfemployed had a slight increase from 42.1% to 43.2% in this period. For the low managerial selfemployed Eurostat finds a decrease from 69.2% to 64.5%. The figures for small entrepreneurs dropped slightly from 56.6% to 54.1%, the same applies for employed persons in personal care work with a minor change (50.6% to 49.8%). Agricultural self-employed had the highest level of such working times; they showed a decrease from 68.4% to 63.4%.", - "page_start": 29, - "page_end": 30, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Conditions of employment and workforce development\nDuring the past decades and at faster pace after 1990, a greater variety of non-standard contractual relations has emerged. Typical characteristics of non-standard work are part-time work, temporary (or fixed-term) work, seasonal work, casual work, home-based work, telework, self-employment or family work. Currently, high public awareness is directed to those types of non-standard work that are connected either to new forms of contracts (voucher, platform, zero-hours, portfolio, etc.) or increasing types of work not bound to the premises of the employer (mobile, at home, at client's place), mostly made possible by the increased use of modern information and communication technologies (ICT). These forms of work often have as a - additional - major characteristic a less clear employerworker relationship .\nHowever, in 2019 the conventional employment contract still accounted for around 86% of the workforce (EU27), 9% are 'own-account' workers, that is, self-employed without employees. The remaining 4% were self-employed with employees (employers) and less than 1% were contributing family workers. Of all employed workers, 17.2% worked part-time and 13.3% had temporary contracts.\nNon-standard types of work that are characterised by the circumstance that the work is not taking place at the premises of the employer are mobile and home-based work, domestic work, care work and long-term domestic care work, and online platform work. In 2019, approximately 77% worked at the employer's premises, 5% at home, 9% at the clients' places and 8% at non-fixed workplaces. With the onset of the COVID-19 pandemic in 2020, the share of work at home more than doubled; in the EU27 it increased from 5.4% in 2019 to 13.4% in 2021.\nCompared to work at the premises of the employer, such non-standard workplaces often miss basic OSH facilities (Minimum requirements at workplaces directive), availability and suitability of help tools (Work equipment directive and Personal protective equipment directive), or provision of adequate digital and mobile tools (Display screen equipment directive).\nEuropean Agency for Safety and Health at Work - EU-OSHA\n11\nOccupational safety and health in Europe - state and trends 2023\nThe workforce structure also significantly changed during the past 15 years, requiring new or adapted prevention solutions, organisationally and technically.", - "page_start": 10, - "page_end": 11, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.3 Contract types and work locations\nThese forms of work often have as a major quality (feature) a less clear employer-employee relation . The main structural element of the EU OSH legislation is the dual role of employers and employees in OSH. The employer has the overall responsibility for OSH (Framework Directive Article 5: '… duty to ensure the safety and health of workers in every aspect related to the work …' ), and the worker the obligation to contribute (Framework Directive Article 13 … 'to take care as far as possible of his own safety and health and that of other persons affected by his acts or omissions …' ). Where OSH legislation has to be applied in less clear employer-employee relations, for example, in the case of self-employed, the relevance and impact of 'dyadic' OSH regulations seem to fade.\nNot only the EU is struggling with this development, but Australia also introduced the legal identity of a PCBU : 'Significantly, the primary duty of care will shift from the 'employer' to the broader 'person conducting a business or undertaking' (PCBU) and duties previously owed to 'employees' will now apply to all workers.' 64\nDuring the past decades, and especially after 1990, a much greater variety of such contractual relations has emerged. However, in 2019 the conventional employment contract (part- or full-time) still accounts for around 86% of the workforce (EU27), they are employees. Seventeen per cent of these employed persons have a part-time contract, 13% of the employees have a temporary contract, or both combined. Nine per cent are self-employed without employees. The remaining 4% are self-employed with employees (employers) and 1% are contributing family workers. The number of self-employed in agriculture halved between 2005 and 2019, which is the biggest factor in the reduction of contributing family workers and the stagnation of the number of self-employed.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n46\nOccupational safety and health in Europe - state and trends 2023\nFigure 18: Employment types in EU27, development 2005 to 2022 65 - Eurostat\nThe minor deviation of the sum of the different types of employment to the 100% 'Employed persons' is due to 'No response' answers. The data of part-time employees and of employees with a temporary contract are for the full year 2019, not for Q4.", - "page_start": 45, - "page_end": 46, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Definitions Eurostat 66\nEmployers = self-employed with employee: employing one or more employees: persons who work in their own business, professional practice or farm for the purpose of earning a profit and who employ at least one other person.\nSelf-employed: not employing any employees (self-employed without employees): persons who work in their business, professional practices or farm for the purpose of earning a profit and who employ no other persons.\nEmployees: persons who work for a public or private employer and who receive compensation in the form of wages, salaries, fees, gratuities, payment by result or in kind. Contributing family workers: persons who help another member of the family to run a farm or business, provided they are not classed as employees.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n47\nOccupational safety and health in Europe - state and trends 2023\nThe quantitative amount of other non-standard types of work often is not well statistically monitored but based on estimates. There are several difficulties to generate reliable statistical data: many of these types of work are less regular, they can be below the level of notification obligations or fully undeclared, obligations for statistical notification are not issued or not followed, and/or these types of work are done in parallel together with other forms of work or income. The OECD estimates that the group with the highest share of these types of work are pensioners who perform such work as a second job. 67\nA special case of contract types are posted and seasonal workers 68 in the EU. Their numbers have been estimated, for example, in annual reports on 'Labour mobility'. 69\nTable 8: Posted and seasonal workers - Eurostat\nRegarding posted workers a recently published report shows the diversity of working conditions, a low availably of data and the high risk of infringements. 70\nConcerning seasonal workers several deficits of OSH were made public, particularly during the COVID19 pandemic. The European Commission guidance on 'Seasonal workers' states: 71\n'… due to the nature of their work, seasonal workers are often more vulnerable than other workers to situations such as precarious working and living conditions, infringement of labour law, inadequate social security coverage, as well as undeclared work. Practices that ensure that employers and workers are provided with correct information and assistance can prevent or address these issues.'", - "page_start": 46, - "page_end": 47, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1.2 Work intensity\nThe analysis of EU survey data shows a mixed picture : Firstly, ESENER data corroborate this hypothesis, the three countries with highest percentage of work under time constraints - that is, Finland, Sweden and Denmark - all have working hours under the EU average. Secondly, LFS data show a different picture; a country like Greece has the longest working hours and also reports the highest time pressure, the same 'combination' - but less extreme - applies to Austria, Cyprus and Malta. Trends of low or less than average working time and no time constraints are reported for Lithuania, and medium working time and low time constraints for Italy and Ireland.\nAn analysis of EWCS data concluded 39 that in general intensity increases with long working hours, in enterprises with 1-19 the work intensity index (on a scale between 0 and 12) is 4.4, in larger enterprises with above 40 employees it is 6.3. This is in line with ESENER data that corroborate the importance of the size of the enterprise for time pressure and long working hours.\nLiterature - from very diverse disciplines - on work intensification points to reasons for intensification on developments as: 40\n· Economic developments, particularly the dominance of neoliberalist policies and enhanced competition between workers, companies and states; reduction of state influence and privatisation. 41\n· Pressure due to substantial organisational changes, for example, introduction of short-term economic objectives in enterprise policies, 42 expansion into new markets or new countries, acquiring other enterprises or merging, being acquired, restructuring of management or of basic staff working conditions (contracts, working time, flexibility). 43\n· Decrease of trade union influence or worker participation regarding labour relations.\n· Liberalisation of labour legislation, creation of 'new forms of work' and new contract types, beyond the permanent full-time employment. 44\n· New forms of management, application of management concepts like just-in-time production or lean management, higher flexibility of production and higher customer orientation, 45\nEuropean Agency for Safety and Health at Work - EU-OSHA\n36\nOccupational safety and health in Europe - state and trends 2023\nsegmentation of enterprises into profit centres, quality management obligations, externalisation/subcontracting of service areas like cleaning, canteen, security and so on.", - "page_start": 35, - "page_end": 36, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "What is the definition of a work accident according to the International Labour Organisation?", - "target_page": 38, - "target_passage": "ILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.’", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "5.4 Globalisation and OSH\n· legal, regulatory and adjudicative frameworks that address and integrate OSH, including core OSH laws and technical regulations;\n· enforcement and compliance with OSH in workplaces, including public, private and nongovernmental systems that operate independently or in concert;\n· employer and worker competencies that are necessary to achieve and sustain OSH at global, national and enterprise levels;\n· social dialogue that supports OSH;\n· public and private financial resources for investment in OSH;\n· occupational health services including public and private health services;\n· employment injury insurance programmes that support prevention of OSH fatalities, injuries and illnesses;\n· OSH professionals, institutions and networks;\n· OSH indicators and implementation of effective methodologies for OSH data collection; and\n· demand for the safety and health of workers and workplaces.\nThe International Social Security Association (ISSA) developed the Vision Zero initiative . 330 ISSA promotes together with enterprises and many global OSH organisations this concept, aiming at the complete elimination of work accidents and occupational diseases.\nThe UN has developed a set of targets and indicators, the Social Development Goals (SDG). 331 Target 8 is dedicated to 'Promote sustained, inclusive and sustainable economic growth, full and productive employment and decent work for all'. Sub targets are:\n8.5 By 2030, achieve full and productive employment and decent work for all women and men, including for young people and persons with disabilities, and equal pay for work of equal value\nEuropean Agency for Safety and Health at Work - EU-OSHA\n116\nOccupational safety and health in Europe - state and trends 2023\n8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and human trafficking and secure the prohibition and elimination of the worst forms of child labour, including recruitment and use of child soldiers, and by 2025 end child labour in all its forms\n8.8 Protect labour rights and promote safe and secure working environments for all workers, including migrant workers, in particular women migrants, and those in precarious employment\nThe WHO is following a global approach towards occupational health . They summarised their base of evidence on global working conditions in some key facts : 332", - "page_start": 115, - "page_end": 116, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "6.1 Foundation, legislation, compliance and supervision\nThe ethical and economic importance of safe and healthy working conditions led to an integration of this target in international conventions and agreements; it is also embedded in the treaties of the EU.\nUN has included 'Safe and secure work environment' as an indicator for Goal 8 of their 17 global 'Sustainable Development Goals ' for 2030. Goal 8 aims to 'Promote sustained, inclusive and sustainable economic growth, full and productive employment and decent work for all' . 334 It requests in its target 8.8 to 'Protect labour rights and promote safe and secure working environments for all workers, including migrant workers, in particular women migrants, and those in precarious employment.'\nThe Preamble to the Constitution 335 of the ILO includes as an objective ' … the protection of the worker against sickness, disease and injury arising out of his employment ...' . In 2022, the objective of a safe and healthy working environment became part of the 'Declaration on Fundamental Principles and Rights at Work', adding OSH to the existing four basic principles, that is, 1) freedom of association and right to collective bargaining, 2) the elimination of all forms of forced or compulsory labour, 3) the effective abolition of child labour, and 4) the elimination of discrimination. Between the year of the foundation in 1919 and today, the ILO agreed on more than 40 conventions and recommendations addressing OSH, be it either general provisions or provisions for specific groups and sectors or specific risks. 336\nThe EU and its predecessors have enshrined health and safety of workers in their founding treaties . Already in 1951, it was stated in Article 3 of the European Coal and Steel Community (ECSC) Treaty that 'The institutions of the Community shall, within the limits of their respective powers, in the common interest … promote improved working conditions and an improved standard of living for the workers in each of the industries for which it is responsible …' . 337 During the development of the European institutions and the EU from those years until today, references to working conditions and safety and health were always part of the treaties, and also in the latest Treaty of Lisbon from 2009. 338", - "page_start": 117, - "page_end": 117, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Definitions Eurostat 66\nEmployers = self-employed with employee: employing one or more employees: persons who work in their own business, professional practice or farm for the purpose of earning a profit and who employ at least one other person.\nSelf-employed: not employing any employees (self-employed without employees): persons who work in their business, professional practices or farm for the purpose of earning a profit and who employ no other persons.\nEmployees: persons who work for a public or private employer and who receive compensation in the form of wages, salaries, fees, gratuities, payment by result or in kind. Contributing family workers: persons who help another member of the family to run a farm or business, provided they are not classed as employees.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n47\nOccupational safety and health in Europe - state and trends 2023\nThe quantitative amount of other non-standard types of work often is not well statistically monitored but based on estimates. There are several difficulties to generate reliable statistical data: many of these types of work are less regular, they can be below the level of notification obligations or fully undeclared, obligations for statistical notification are not issued or not followed, and/or these types of work are done in parallel together with other forms of work or income. The OECD estimates that the group with the highest share of these types of work are pensioners who perform such work as a second job. 67\nA special case of contract types are posted and seasonal workers 68 in the EU. Their numbers have been estimated, for example, in annual reports on 'Labour mobility'. 69\nTable 8: Posted and seasonal workers - Eurostat\nRegarding posted workers a recently published report shows the diversity of working conditions, a low availably of data and the high risk of infringements. 70\nConcerning seasonal workers several deficits of OSH were made public, particularly during the COVID19 pandemic. The European Commission guidance on 'Seasonal workers' states: 71\n'… due to the nature of their work, seasonal workers are often more vulnerable than other workers to situations such as precarious working and living conditions, infringement of labour law, inadequate social security coverage, as well as undeclared work. Practices that ensure that employers and workers are provided with correct information and assistance can prevent or address these issues.'", - "page_start": 46, - "page_end": 47, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.5 Worker groups with specific risks and needs\nAlready in 1996 the European Commission identified in its 'Guidance on Risk Assessment at Work' 95 'sensitive risk groups' as workers with disabilities, young and old workers, pregnant and nursing mothers, and untrained or inexperienced workers including temporary or migrant workers. Often these groups are addressed as 'Vulnerable groups' 96 or 'Groups at risk'. 97 Other institutions and authors include older workers, women, self-employed or low-qualified workers, and the ILO includes also workers in the informal economy. All these 'assignments' refer either to individual (endogenous) characteristics or to the position on the labour market .\nThe scientific literature on the group-related particular risks for health and safety at work is very broad. EU-OSHA and practically all national and international OSH organisations have published studies and provided fact sheets and guidance documents. An overview on such publications shows that awareness, knowledge and policies in and outside enterprises have substantially developed and increased, but there is less evidence about progress in practice.\nThe textbox below shows some of these specific characteristics for five groups: women, migrants, lowqualified workers, ageing workers and young workers. The Directorate-General for Internal Policies of the Union compiled this in 2010, based on several EU and OECD background documents. 98\nEuropean Agency for Safety and Health at Work - EU-OSHA\n54\nOccupational safety and health in Europe - state and trends 2023", - "page_start": 53, - "page_end": 54, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1.2 Work intensity\n· Increased communication and interdependency, time coordination and synchronisation requirements between units, enterprises and in supply chains.\n· Less direct supervision and more objective and results-based management.\n· Last but not least the massive introduction of ICT and other work-intensifying technologies.\nThe main reasons for stagnation after 2005 might be that many of the above-mentioned concepts or policies were developed or had their peak during the 1980s, 1990s or the first decade of the 21st century. Some of them lost their dynamic (e.g. privatisation), or have become a kind of standard (management by objectives), or were widely implemented in the first decade of the 21 st century (ICT facilities at most workplaces); also, some negative impacts on working time were mitigated by state interventions (i.e. the EU Working time directive 46 ) or labour agreements. 47\nOf particular interest for OSH probably is that the changes in labour legislation, the production in international supply chains and technological improvements were sufficiently developed to shift quite a relevant part of work to other types of contracts, that is, to subcontractors, self-employed or temporary agent workers and other forms of non-standard work contracts. Reasons were economic savings but also better management of intense work periods, peak times and risky work .\nThese developments are probably the main reason that work intensity stayed at a similar level for the employed workers with a standard contract while the working conditions of other types of work degraded. EU-OSHA has taken this conclusion already in 2002 in its report 48 on 'New Forms of Contractual Relationships and the Implications for Occupational Safety and Health':\n'1. the transfer of risks in the (practical) conditions of work to non-permanent employees and to subcontractors;\n2. segmentation in the workforce based on differences in contractual conditions of employment (working hours, job insecurity, and qualifications).\nIn the first scenario, risks directly related to working conditions (bad ambient and ergonomic conditions)\nEuropean Agency for Safety and Health at Work - EU-OSHA\n37\nOccupational safety and health in Europe - state and trends 2023\nare shifted towards non-permanent workers and subcontractors, who have less protection and/or knowledge to cope with these risks. This scenario is not easy to verify in quantitative data, although it is frequently stated in case study research.'", - "page_start": 36, - "page_end": 37, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "5.4 Globalisation and OSH\n· In many countries more than half of workers are employed in the informal sector with no social protection for seeking health care and lack of regulatory enforcement of occupational health and safety standards.\n· Occupational health services to advise employers on improving working conditions and monitoring the health of workers cover mostly big companies in the formal sector and more than 85% of workers in small enterprises, informal sector, agriculture and migrants worldwide do not have any occupational health coverage.\n· Work-related health problems result in an economic loss of 4-6% of GDP for most countries. The basic health services to prevent occupational and work-related diseases cost on average between US$ 18 and US$ 60 (purchasing power parity) per worker.\n· About 70% of workers do not have any insurance to compensate them in case of occupational diseases and injuries.\n· Research has demonstrated that workplace health initiatives can help reduce sick leave absenteeism by 27% and health-care costs for companies by 26%.\nBased on this evidence, the WHO Global Assembly agreed on a 'Worker health global plan of action' in 2007 333 (updated 2013) that included targets like better prevention at workplaces, that is, Objective 2: to protect and promote health at the workplace. The WHO has worked together with the ILO to estimate the burden of diseases from work and published the 'WHO/ILO joint estimates of the work-related burden of disease and injury'.\nWhen looking at the work of global institutions during the past two to three decades - and for the ILO also much further back - many important agreements, conventions, government actions and global business programmes have been negotiated, agreed and issued. The objectives and necessary measures at a global level have been made much more concrete by these efforts. OSH and working conditions are on the agenda of these organisations, and general and concrete targets and indicators have been set. The task is the implementation of these principles and programmes in every region and country of the world in a way that it reaches all workplaces.\nOSH Barometer - OSH Infrastructure - International organisations and international programmes https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/international-organisations https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/international-programmes\nESENER - Data visualisation\nhttps://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019", - "page_start": 116, - "page_end": 116, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.1.2 Work intensity\nThe analysis of EU survey data shows a mixed picture : Firstly, ESENER data corroborate this hypothesis, the three countries with highest percentage of work under time constraints - that is, Finland, Sweden and Denmark - all have working hours under the EU average. Secondly, LFS data show a different picture; a country like Greece has the longest working hours and also reports the highest time pressure, the same 'combination' - but less extreme - applies to Austria, Cyprus and Malta. Trends of low or less than average working time and no time constraints are reported for Lithuania, and medium working time and low time constraints for Italy and Ireland.\nAn analysis of EWCS data concluded 39 that in general intensity increases with long working hours, in enterprises with 1-19 the work intensity index (on a scale between 0 and 12) is 4.4, in larger enterprises with above 40 employees it is 6.3. This is in line with ESENER data that corroborate the importance of the size of the enterprise for time pressure and long working hours.\nLiterature - from very diverse disciplines - on work intensification points to reasons for intensification on developments as: 40\n· Economic developments, particularly the dominance of neoliberalist policies and enhanced competition between workers, companies and states; reduction of state influence and privatisation. 41\n· Pressure due to substantial organisational changes, for example, introduction of short-term economic objectives in enterprise policies, 42 expansion into new markets or new countries, acquiring other enterprises or merging, being acquired, restructuring of management or of basic staff working conditions (contracts, working time, flexibility). 43\n· Decrease of trade union influence or worker participation regarding labour relations.\n· Liberalisation of labour legislation, creation of 'new forms of work' and new contract types, beyond the permanent full-time employment. 44\n· New forms of management, application of management concepts like just-in-time production or lean management, higher flexibility of production and higher customer orientation, 45\nEuropean Agency for Safety and Health at Work - EU-OSHA\n36\nOccupational safety and health in Europe - state and trends 2023\nsegmentation of enterprises into profit centres, quality management obligations, externalisation/subcontracting of service areas like cleaning, canteen, security and so on.", - "page_start": 35, - "page_end": 36, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "5.4 Globalisation and OSH\nInternational organisations like the ILO, WHO and UN have also taken up the task to promote OSH worldwide . The ILO has established a system of conventions; their implementation is monitored in the signature states. 324 The ILO has issued and decided on nine 'Fundamental conventions' that have been signed by 92% of the ILO member states. 325 These fundamental conventions are:\n1. Freedom of Association and Protection of the Right to Organise Convention, 1948 (No. 87);\n2. Right to Organise and Collective Bargaining Convention, 1949 (No. 98);\n3. Forced Labour Convention, 1930 (No. 29) (and its 2014 Protocol);\n4. Abolition of Forced Labour Convention, 1957 (No. 105);\n5. Minimum Age Convention, 1973 (No. 138);\n6. Worst Forms of Child Labour Convention, 1999 (No. 182);\n7. Equal Remuneration Convention, 1951 (No. 100);\n8. Discrimination (Employment and Occupation) Convention, 1958 (No. 111); and\n9. (since 2022) Two conventions on Occupational Safety and Health, that is, C-155 Occupational Safety and Health Convention, 326 and C-187 Promotional Framework for OSH Convention. 327\nThe ILO also promotes the 'Decent work' approach to improve working conditions, covering aspects like fair income, social protection for families, better prospects for personal development and social integration, and equal opportunities and treatment. In the frame of this approach, the ILO has developed flagship programmes like 'Safety and Health for all' 328 and the 'Global Action for Prevention on Occupational Safety and Health' (OSH-GAP) , a programme to support and promote OSH globally. 329 Its priorities are:", - "page_start": 115, - "page_end": 115, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "References and notes\n82 Persons in employment by main place of work, frequency of working at other locations and working from home,\nLFS Ad hoc module: Work at home, percentage of Employed persons\n83\nEurostat: Working from home in the EU\n84 LFS Ad hoc module Work at home, percentage of Employed persons and LFS regular data collection Employed persons working from home as a percentage of the total employment\n85 EU-OSHA, 2021: Home-based teleworking and preventive occupational safety and health measures in European workplaces: evidence from ESENER-3\n86 Employed persons working from home as a percentage of the total employment, by sex, age and professional status (%), here\n87 There are more workers who spend most of their working time in private homes, e.g. technicians for maintenance and repair of technical systems like heating water supply or electricity, or gardeners. According to the ILO definition of domestic work they are not regarded as such. Care at home can be borderline if the care is mainly done for a few persons in a few homes.\n88 C189 European Alliance, 2021: Step up efforts towards decent work for domestic workers in the EU: 10th Anniversary of ILO Domestic Workers Convention, 2011 (No. 189)\nSee there in the introductory chapter the difficulties to achieve reliable figures. For more info: ILO, 2021: Making decent work a reality for domestic workers: Progress and prospects ten years after the adoption of the Domestic Workers Convention, 2011 (No. 189)\n89 EU-OSHA, 2020: Well-being at work in the service voucher sector in Belgium\nEuropean Agency for Safety and Health at Work - EU-OSHA\n144\nOccupational safety and health in Europe - state and trends 2023\n90 Eurofound, 2020: Long-term care workforce: Employment and working conditions\nEurostat: National accounts employment data by industry (up to NACE A*64): Growth from 7.4 million in 2008 to 9.5 million in 2019, here Filter [Q87_Q88] Residential care activities and social work activities without accommodation.", - "page_start": 143, - "page_end": 144, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "3.4 Mobile work, home as workplace and domestic work\n· LTC workers often report that they do not believe they will be able to keep working until the age of 60.\n· LTC workers often do shift work, in particular rotating shifts, and feel that they have no say in their working arrangements; they are often requested to come to work at short notice. Evening, night and weekend work is particularly frequent in residential LTC.\n· Two -fifths (40%) of LTC workers report lifting or moving people more than three -quarters of the time (compared with 5% of all workers and 23% in healthcare).\nLive-in care is a special form where the carer lives permanently in the house or flat of the care receiver. Eurostat data are not available but national estimates are available for some countries; the estimate for Italy is 160,000 and for Germany 300,000. 92\nOverviews of the quantity of ICT-based mobile work 93 demonstrate that such schemes exist in many enterprises and workplaces, particularly for clerical, managerial and professional tasks. For a large share of clerical workers, it has become - latest with the push of the 2020/2021 pandemic - a usual way of working. The highest proportions of workers with arrangements for ICT mobile work are found int the following sectors: information and communication (57% of workers in the sector), followed by professional and scientific activities (53%), financial services (43%), real estate (43%) and public administration (30%).\nWhich working conditions characterise these groups of home workers and mobile workers and different types of work from, at and in homes ?\nAs mentioned before, the principal question for all these types of non-stationary work is: to which degree does the OSH level at these workplaces at home or mobile deviate from the OSH level at stationary workplaces ? And which of these deviations are unavoidable, and where are better OSH solutions possible ?\nMain issues are:\n· space (in cars, trains, hotels, private flats, etc.);\n· less well-adapted work equipment, for example, possibilities for ergonomic equipment at mobile workplaces;\n· availability of tools, that is, for example, lifting equipment in home care;\n· certain facilities like toilets, for example, at construction sites, for bus drivers;\n· emergency facilities, for example, fire extinguisher;\nEuropean Agency for Safety and Health at Work - EU-OSHA\n53", - "page_start": 52, - "page_end": 52, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Was knowledge domain agnosticism a goal in the development of OLAF?", - "target_page": 1, - "target_passage": "Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations represented largely depend on one or more business use cases. As we designed our framework with industry application in mind, we need to consider it within its real-world usage context.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Knowledge representation\nKnowledge representation and knowledge engineering [17] allow AI programs to answer questions intelligently and make deductions about real-world facts. Formal knowledge representations are used in content-based indexing and retrieval, [18] scene interpretation, [19] clinical decision support, [20] knowledge discovery (mining \"interesting\" and actionable inferences from large databases), [21] and other areas. [22]\nA knowledge base is a body of knowledge represented in a form that can be used by a program. An ontology is the set of objects, relations, concepts, and properties used by a particular domain of knowledge. [23] Knowledge bases need to represent things such as objects, properties, categories, and relations between objects; [24] situations, events, states, and time; [25] causes and effects; [26] knowledge about knowledge (what we know about what other people\nAn ontology represents knowledge as a set of concepts within a domain and the relationships between those concepts.\nknow); [27] default reasoning (things that humans assume are true until they are told differently and will remain true even when other facts are changing); [28] and many other aspects and domains of knowledge.\nAmong the most difficult problems in knowledge representation are the breadth of commonsense knowledge (the set of atomic facts that the average person knows is enormous); [29] and the sub-symbolic form of most commonsense knowledge (much of what people know is not represented as \"facts\" or \"statements\" that they could express verbally). [16] There is also the difficulty of knowledge acquisition, the problem of obtaining knowledge for AI applications. [c]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\n= Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Ontology based-system = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, OLAF IN A PRACTICAL CONTEXT.Ontology = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Our framework", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "Informal\nThe epistemic approach to informal logic, on the other hand, focuses on the epistemic role of arguments. [148] It is based on the idea that arguments aim to increase our knowledge. They achieve this by linking justified beliefs to beliefs that are not yet justified. [149] Correct arguments succeed at expanding knowledge while fallacies are epistemic failures: they do not justify the belief in their conclusion. [150] For example, the fallacy of begging the question is a fallacy because it fails to provide independent justification for its conclusion, even though it is deductively valid. [151] In this sense, logical normativity consists in epistemic success or rationality. [149] The Bayesian approach is one example of an epistemic approach. [152] Central to Bayesianism is not just whether the agent believes something but the degree to which they believe it, the so-called credence . Degrees of belief are seen as subjective probabilities in the believed proposition, i.e. how certain the agent is that the proposition is true. [153] On this view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new\nincoming information. [154] Correct reasoning and the arguments it is based on follow the laws of probability, for example, the principle of conditionalization. Bad or irrational reasoning, on the other hand, violates these laws. [155]", - "page_start": 12, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Exercise 11: Define the domain and range of the hasTopping property\nIt is possible to specify more than one class as the domain or range of a property. One of the most common mistakes of new users is to do this and expect that the resulting domain/range is the union of the two classes. However, note that next to the Domain and Range in the Description view it says (intersection). This is because the semantics of having 2 or more classes as the domain or range is the intersection of those classes not the union. E.g., if one defined the domain for a property to be Pizza and then added another domain IceCream that would mean that for something to be in the domain of that property it would have to be an instance of both Pizza and IceCream not (as people often expect) the union of those two sets which would be either the class Pizza or the class IceCream . Also, note that the domain and range are for inferencing, they are not data integrity constraints. This distinction will be explained in more detail below in the section on SHACL.\n28", - "page_start": 28, - "page_end": 28, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Criticisms\nThe main criticisms of eliminative materialism and illusionism hinge on the counterintuitive nature of the view. Arguments of this form are called Moorean Arguments . A Moorean argument seeks to undermine the conclusion of an argument by asserting that the negation of that conclusion is more certain than the premises of the argument. [79]\nThe roots of the Moorean Argument against illusionism extend back to Augustine of Hippo who stated that he could not be deceived regarding his own existence, since the very act of being deceived secures the existence of a being there to be the recipient of that deception. [note 1][80]\nIn the Early-Modern era, these arguments were repopularized by René Descartes, who coined the now famous phrase \"Je pense, donc je suis\" (\"I think, therefore I am\"). [81] Descartes argued that even if he was maximally deceived (because, for example, an evil demon was manipulating all his senses) he would still know with certainty that his mind exists, because the state of being deceived requires a mind as a prerequisite. [82]\nThis same general argumentative structure is still in use today. For example, in 2002 David Chalmers published an explicitly Moorean argument against illusionism. The argument goes like this: The reality of consciousness is more certain than any theoretical commitments (to, for example, physicalism) that may be motivating the illusionist to deny the existence of consciousness. The reason for this is because we have direct \"acquaintance\" with consciousness, but we do not have direct acquaintance with anything else (including anything that could inform our beliefs in consciousness being an illusion). In other words: consciousness can be known directly, so the reality of consciousness is more certain than any philosophical or scientific theory that says otherwise. [83] Chalmers concludes that \"there is little doubt that something like the Moorean argument is the reason that most people reject illusionism and many find it crazy.\" [84]", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia2.pdf" - }, - { - "text": "cat terraform.tfvars\ndns_domain = \"domain.example.com\"\n# DNS Domain Name", - "page_start": 130, - "page_end": 130, - "source_file": "sg248459.pdf" - }, - { - "text": "Knowledge argument\nThe knowledge argument, also known as Mary's Room , is another common thought experiment: A hypothetical neuroscientist named Mary has lived her whole life in a black-and-white room and has never seen colour before. She also happens to know everything there is to know about the brain and colour perception. [50] Chalmers believes [48] that when Mary sees the colour red for the first time, she gains new knowledge - the knowledge of \"what red looks like\" - which is distinct from, and irreducible to, her prior physical knowledge of the brain or visual system. A stronger form of the knowledge argument [50] claims not merely that Mary would lack subjective knowledge of \"what red looks like,\" but that she would lack knowledge of an objective fact about the world: namely, \"what red looks like,\" a non-physical fact that can be learned only through direct experience (qualia). Others, such as Thomas Nagel, take a \"physicalist\" position, disagree with the argument in its stronger and/or weaker forms. [50] For example, Nagel put forward a \"speculative proposal\" of devising a language that could \"explain to a person blind from birth what it is like to see.\" [31] The knowledge argument implies that such a language could not exist.", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia2.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\n= OLAF Pipeline Optimisation. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., OLAF IN A PRACTICAL CONTEXT.Ontology = . OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., = . edge recovery. adaptable approaches., Pros and cons Ontologies can be exported in = tags and does not distinguish between terms and concepts. It implements different. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., Ontology based-system = Knowledge sources Text Corpus. edge recovery. adaptable approaches., = Seed Ontology. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., OLAF IN A PRACTICAL CONTEXT.Ontology = . edge recovery. adaptable approaches., = . Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Pros and cons Ontologies can be exported in = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE,", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "3.3 World knowledge\nThe bulk of evidence about commonsense knowledge captured in BERT comes from practitioners using it to extract such knowledge. One direct probing study of BERT reports that BERT struggles with pragmatic inference and role-based event knowledge (Ettinger, 2019). BERT also struggles with abstract attributes of objects, as well as visual and perceptual properties that are likely to be assumed rather than mentioned (Da and Kasai, 2019).\nThe MLM component of BERT is easy to adapt for knowledge induction by filling in the\nKG\nDante\nborn-in\nFlorence\nFigure 1:\nQuerying knowledge bases (KB) and lan-\nguage models (LM) for factual knowledge. Figure 2: BERT world knowledge (Petroni et al., 2019)\nvast amounts of linguistic knowledge (Peters et al., 2018b; Goldberg, 2019; Tenney et al., 2019) useful for downstream tasks. This knowledge is usually accessed either by conditioning on latent context representations produced by the original model or by using the original model weights to initialize a task-specific model which is then further fine-tuned. This type of knowledge transfer is crucial for current state-of-the-art results on a wide range of tasks. In contrast, knowledge bases are e ective soblanks (e.g. \"Cats like to chase [___]\"). Petroni et al. (2019) showed that, for some relation types, vanilla BERT is competitive with methods relying on knowledge bases (Figure 2), and Roberts et al. (2020) show the same for open-domain QA using T5 model (Raffel et al., 2019). Davison et al. (2019) suggest that it generalizes better to unseen data. In order to retrieve BERT's knowledge, we need good template sentences, and there is work on their automatic extraction and augmentation (Bouraoui et al., 2019; Jiang et al., 2019b).", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\nText2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, Pros and cons Ontologies can be exported in = various formats. GATE system adds great visualisations. But it is not maintained since 2011.. Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, Ontology based-system = Ontology Use Cases. Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = Final Application. Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4,", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Is OLAF a specific strategy for ontological learning or is it a toolbox of different strategies?", - "target_page": 1, - "target_passage": "Our vision is to implement a toolbox of methods we can gather to build pipelines. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "OLAF : Ontology Learning Applied Framework\n= OLAF Pipeline Optimisation. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., OLAF IN A PRACTICAL CONTEXT.Ontology = . OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., = . edge recovery. adaptable approaches., Pros and cons Ontologies can be exported in = tags and does not distinguish between terms and concepts. It implements different. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., Ontology based-system = Knowledge sources Text Corpus. edge recovery. adaptable approaches., = Seed Ontology. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., OLAF IN A PRACTICAL CONTEXT.Ontology = . edge recovery. adaptable approaches., = . Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Pros and cons Ontologies can be exported in = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE,", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\n= Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Ontology based-system = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, OLAF IN A PRACTICAL CONTEXT.Ontology = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Our framework", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "Chapter 3 What are OWL Ontologies?\nOntologies are used to capture knowledge about some domain of interest. An ontology describes the concepts in the domain and also the relationships that hold between those concepts. Different ontology languages provide different facilities. The most recent development in standard ontology languages is OWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can be found at: https://www.w3.org/TR/owl2-primer/\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. Complex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner which can check whether all of the statements and definitions in the ontology are mutually consistent and can also recognize which concepts fit under which definitions. The reasoner can therefore help to maintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can have more than one parent. The reasoner can also infer additional information. For example, if two properties are inverses only one value needs to be asserted by the user and the inverse value will be automatically inferred by the reasoner.", - "page_start": 6, - "page_end": 6, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\n= Activity Optional. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, OLAF IN A PRACTICAL CONTEXT.Ontology = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. , Pros and cons Ontologies can be exported in = Hierarchisation. , = Axiom Ontology. , Ontology based-system = Artifact. , = . , = CAPTION. , OLAF IN A PRACTICAL CONTEXT.Ontology = CAPTION. , = CAPTION. Rule-based axiom extraction, Pros and cons Ontologies can be exported in = . Rule-based axiom extraction, = Axiom Ontology. Rule-based axiom extraction, Ontology based-system = Artifact. Rule-based axiom extraction, = Different serialization techniques\ncan be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) Jean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically extracting and structuring knowledge relevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a modular ontology learning framework considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning systems as tools to help the domain expert, we developed the proposed framework with full automation in mind. An implementation as an opensource and collaborative python library is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning.", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "A Extended Related Works\nWe first review approaches for learning visual perception from static images before discussing strategies for learning from video.", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv3.pdf" - }, - { - "text": "Chapter 7 Names: IRI's, Labels, and Namespaces\n9 IRIs are also sometimes called URIs. A URI is the same as an IRI except that URIs only support ASCII characters whereas IRIs can support other character sets such as Kanji. The term people use these days is usually IRI.\n60\nnext section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology about telecommunications. You might also have a class called Network in an ontology about graph theory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when you referred to the Network class for the Telecom ontology you would use tc:Network and gt:Network for the graph theory class.\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl and is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description Framework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.", - "page_start": 60, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.1 Components of OWL Ontologies\nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in OWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from set theory are also implemented in OWL such as Disjoint sets, the Empty set ( owl:Nothing ), inverse\n1 http://protege.stanford.edu\n6\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document Overview of Set Theory available at:\nhttps://www.michaeldebellis.com/post/owl-theoretical-basics", - "page_start": 6, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "OLAF : Ontology Learning Applied Framework\n= . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, OLAF IN A PRACTICAL CONTEXT.Ontology = . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = Pipeline Execution. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., Pros and cons Ontologies can be exported in = It relies on WordNet and POS It considers only multiword terms and relies on WordNet and POS tags. It does not distinguish between terms and concepts and implements different adaptable approaches.. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic).,", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "9.21 Some SPARQL Pizza Queries\nTo start with go to the SPARQL Query tab. If it isn't already there you can as always add it using Window>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the bottom which holds the results. There should be some text already there. It may look confusing, but we'll explain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of classes and class expressions returned.\n67\nTo understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from since you didn't add them to your ontology. The answer is that every OWL ontology comes with a set of namespaces and prefixes that are required to define the ontology.\nAlso, to understand SPARQL you need to 'peak under the hood' of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example Customer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.", - "page_start": 67, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Is Text2Onto still updated nowadays?", - "target_page": 1, - "target_passage": "But it is not maintained since 2011.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "D.2 Evaluation results per task\nTable 7: Models included in the benchmark with their main characteristics. The size in Gb is estimated using the number of parameters counted as float32 numbers. Sentence sim refers to the fact that the model was trained on a task that favors semantic similarity.\nEmb. dim. = 384. text2vec-base-multilingual, License = Apache-2.0. text2vec-base-multilingual, Sentence sim = Yes. text-embedding-ada-002, Finetuned = N/A. text-embedding-ada-002, Language = multilingual. text-embedding-ada-002, # params = N/A. text-embedding-ada-002, Size (Gb) = N/A. text-embedding-ada-002, Seq. Len. = 8191. text-embedding-ada-002, Emb. dim. = 1536. text-embedding-ada-002, License = Closed source. text-embedding-ada-002, Sentence sim = N/A. text-embedding-3-small, Finetuned = N/A. text-embedding-3-small, Language = multilingual. text-embedding-3-small, # params = N/A. text-embedding-3-small, Size (Gb) = N/A. text-embedding-3-small, Seq. Len. = 8191. text-embedding-3-small, Emb. dim. = 1536. text-embedding-3-small, License = Closed source. text-embedding-3-small, Sentence sim = N/A. text-embedding-3-large, Finetuned = N/A. text-embedding-3-large, Language = multilingual. text-embedding-3-large, # params = N/A. text-embedding-3-large, Size (Gb) = N/A. text-embedding-3-large, Seq. Len. = 8191. text-embedding-3-large, Emb. dim. = 3072.", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 10: Performance of each model for Classification and Pair Classification.\nsentence-t5-xxl, AmazonRe views.PairClassification = 0.46. sentence-t5-xxl, P awsX.PairClassification = 0.64. sentence-t5-xxl, Opuspar cusPC.PairClassification = 0.94. text2vec-base-multilingual, Massi v eScenario.Classification = 0.58. text2vec-base-multilingual, Massi v eIntent.Classification = 0.52. text2vec-base-multilingual, MasakhaNEWS.Classification = 0.74. text2vec-base-multilingual, MT OPIntent.Classification = 0.45. text2vec-base-multilingual, MT OPDomain.Classification = 0.72. text2vec-base-multilingual, AmazonRe views.PairClassification = 0.34. text2vec-base-multilingual, P awsX.PairClassification = 0.66. text2vec-base-multilingual, Opuspar cusPC.PairClassification = 0.92. text-embedding-3-large, Massi v eScenario.Classification = 0.76. text-embedding-3-large, Massi v eIntent.Classification = 0.71. text-embedding-3-large, MasakhaNEWS.Classification = 0.82. text-embedding-3-large, MT OPIntent.Classification = 0.74. text-embedding-3-large, MT OPDomain.Classification = 0.93. text-embedding-3-large, AmazonRe views.PairClassification = 0.46. text-embedding-3-large, P awsX.PairClassification = 0.65. text-embedding-3-large, Opuspar cusPC.PairClassification = 0.96. text-embedding-3-small, Massi v eScenario.Classification = 0.73. text-embedding-3-small, Massi v eIntent.Classification = 0.68. text-embedding-3-small, MasakhaNEWS.Classification =", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 9: Average performance of models per task category.\n0.29. text-embedding-3-large, A v erage = 0.71. text-embedding-3-large, BitextMining = 0.96. text-embedding-3-large, Classification = 0.74. text-embedding-3-large, Clustering = 0.48. text-embedding-3-large, P airClassification = 0.80. text-embedding-3-large, Reranking = 0.86. text-embedding-3-large, Retrie v al = 0.73. text-embedding-3-large, STS = 0.81. text-embedding-3-large, Summarization = 0.30. text-embedding-3-small, A v erage = 0.69. text-embedding-3-small, BitextMining = 0.95. text-embedding-3-small, Classification = 0.70. text-embedding-3-small, Clustering = 0.49. text-embedding-3-small, P airClassification = 0.77. text-embedding-3-small, Reranking = 0.81. text-embedding-3-small, Retrie v al = 0.68. text-embedding-3-small, STS = 0.79. text-embedding-3-small, Summarization = 0.30. text-embedding-ada-002, A v erage = 0.69. text-embedding-ada-002, BitextMining = 0.95. text-embedding-ada-002, Classification = 0.69. text-embedding-ada-002, Clustering = 0.51. text-embedding-ada-002, P airClassification = 0.77. text-embedding-ada-002, Reranking = 0.82. text-embedding-ada-002, Retrie v al = 0.67. text-embedding-ada-002, STS = 0.78. text-embedding-ada-002, Summarization", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv4.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 8: Prompts used for the evaluation of e5-mistral-7b-instruct .\nClassification, Prompt = \"Classify the following task: \". Clustering, Prompt = \"Identify the topic or theme based on the text: \". Retrieval, Prompt = \"Retrieve semantically similar text: \". Reranking, Prompt = \"Re-rank the following text: \". Pair Classification, Prompt = \"Classify the following pair of text: \". STS, Prompt = \"Determine the similarity between the following text:. Summarization, Prompt = \"Summarize the following text: \". Bitext Mining, Prompt = \"Translate the following text: \"", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv4.pdf" - }, - { - "text": "June 2019, Eighth Edition\nThis revision includes the following new and changed information.", - "page_start": 20, - "page_end": 20, - "source_file": "sg247938.pdf" - }, - { - "text": "D.2 Evaluation results per task\nTable 13: Performance of each model for Clustering.\nofS2S = 0.54. text-embedding-3-large, AlloPr ofP2P = 0.62. text-embedding-3-small, MasakhaNEWSS2S = 0.55. text-embedding-3-small, MasakhaNEWSP2P = 0.45. text-embedding-3-small, MLSUMS2S = 0.46. text-embedding-3-small, MLSUMP2P Clustering = 0.46. text-embedding-3-small, HALS2S = 0.36. text-embedding-3-small, AlloPr ofS2S = 0.51. text-embedding-3-small, AlloPr ofP2P = 0.61. text-embedding-ada-002, MasakhaNEWSS2S = 0.49. text-embedding-ada-002, MasakhaNEWSP2P = 0.68. text-embedding-ada-002, MLSUMS2S = 0.42. text-embedding-ada-002, MLSUMP2P Clustering = 0.45. text-embedding-ada-002, HALS2S = 0.35. text-embedding-ada-002, AlloPr ofS2S = 0.54. text-embedding-ada-002, AlloPr ofP2P = 0.65. voyage-code-2, MasakhaNEWSS2S = 0.35. voyage-code-2, MasakhaNEWSP2P = 0.57. voyage-code-2, MLSUMS2S = 0.41. voyage-code-2, MLSUMP2P Clustering = 0.45. voyage-code-2, HALS2S = 0.35. voyage-code-2, AlloPr ofS2S = 0.51. voyage-code-2, AlloPr ofP2P = 0.62. universal-sentence-encoder-multilingual-3, MasakhaNEWSS2S = 0.40. universal-sentence-encoder-multilingual-3,", - "page_start": 24, - "page_end": 24, - "source_file": "arxiv4.pdf" - }, - { - "text": "PDF/UA Tags\nノ\nExpand table\nWorkbook, Tags = . , Tags = . , Tags = Type=Workbook. Range of Cells, Tags = . , Tags = . , Tags =
. , Tags = text content. Table, Tags = . , Tags = . , Tags = . , Tags = \nTable Header Cell, Tags
text content text content = ID= unique id. Cell with Header Style, Tags text content text content = . Header and Footer, Tags text content text content = . Comment, Tags text content text content = . Decorative Graphical Object, Tags text content text content = . Graphical Object other Group with Alt Text, Tags text content text content =
Alt= alt text (object type). Graphical Object other than Shape without Alt Text, Tags
text content text content =
Alt= blank. , Tags
text content text content = no tags. Shape without Alt Text, text, fill, outline, or hyperlink, Tags text content text content = \nShape without Alt Text with whitespace text or no text, Tags = . , Tags =
Alt= blank. Shape without Alt Text with non-whitespace text without Equation, Tags = . , Tags = text content. WordArt without Alt Text or Decorative, Tags = Alt= alt text + text (shape type). , Tags = tags for child objects. , Tags =
Alt= alt text (object type) tags for child objects. Decorative Picture in Cell, Tags = . Picture without Alt Text in Cell, Tags = . , Tags = no tags", - "page_start": 44, - "page_end": 46, - "source_file": "office-pdf.pdf" - }, - { - "text": "A. Camero-Arranz\nFundaci'on Espa˜nola de Ciencia y Tecnolog'ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "Chapter 12 Web Protégé\nTo start we need to export the ontology to a file. Note that one of the tabs at the top is History. Select that tab. This tab shows a list of each version of the ontology. There should be 2 versions labelled R1 and R2 (in the right corner of each version). The most recent version is always at the top since that is typically what you want although it is also possible to roll back changes to previous versions. We want to export the latest version R2. Click on the R2 icon. This should give you a drop-down menu with two options: Revert changes in revision 2 and Download revision 2. Select Download revision 2. This will prompt you with the standard file browser for your OS to save a zip file with the new ontology. The ontology is saved with a zip file because ontologies can be large and since Web Protégé is working over a network we may want to limit the network traffic for large ontologies. Select the appropriate place to save the Zip archive file on the machine where you have Protégé. Do the standard things you would do to unzip the file and load it into Protégé. Note that when you unzip the file it will create a directory as well, so the file won't be directly under whatever directory you save it to. Instead, there will be a directory titled something like pizza-with-data-ontologies-owl-REVISION-2 that the OWL file will be in.", - "page_start": 87, - "page_end": 87, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "5.2 Customizing the Protégé User Interface\nIn order to demonstrate our new data property, we will need to create some instances of the Pizza class and set the value of the data property hasCaloricContent. One of the advantages of Protégé is that it is highly customizable to your specific requirements and work style. There are many views that are available that aren't included in the default Protégé environment because it would be too cluttered. In addition, all of the views that you have already used can be resized, removed, or added to existing tabs. You can also create completely new tabs of your own.\nAs an example, we are going to first bring up a new major tab called Individuals by class. This tab can be useful to create individuals and to add or edit their object and data property values. We are going to customize this tab to make it easier to use by adding a new view to it.\nTo begin use the menu option Window>Tabs>Individuals by class to bring up this new tab. Of course, if it already exists in your UI simply select it.\nWe want to make add a new view as an additional sub-tab in the view that currently has the Annotations and Usage, tabs near the upper right corner 8 . Once you are in the Individuals by class tab select Window>Views>Individual views>Individuals by type (inferred). This will give you a blue outline of the new view. As you move the outline around the existing window it will change depending how you move it, indicating how it will fit into the existing tab after you click. When the blue outline looks like figure 5.2 click left and you will see the new view added as another sub-tab.\nAfter you click your UI should now look similar to figure 5.3. If you clicked somewhere else you can just go to the new view and delete it by clicking the X in the upper right corner of the view and then redo it and position it correctly. At first it may seem a bit unintuitive but after you do it a few times it becomes very easy to position new views.", - "page_start": 50, - "page_end": 50, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "What was the proportion of revenue generated by wireless telecommunications operations in 2009?", - "target_page": 91, - "target_passage": "6,685", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "FOUR BUSINESS SEGMENTS\nWe report our results of operations in four segments.\nCable, Wireless telecommunications operations for consumers and businesses = Cable telecommunications operations, including cable television, Internet and cable telephony for Canadian consumers and businesses. Business Solutions, Wireless telecommunications operations for consumers and businesses = Network connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud-based services for medium and large Canadian businesses, governments, and other telecommunications providers. Media, Wireless telecommunications operations for consumers and businesses = A diversified portfolio of media properties, including television and radio broadcasting, digital media, multi- platform shopping, publishing and sports media and entertainment\n26 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Higher Network Revenue\nNetwork revenue includes revenue derived from voice and data services from postpaid monthly fees, airtime, data usage, long distance charges, optional service charges, inbound and outbound roaming charges and certain fees, as well as prepaid usage for airtime, data and other ancillary charges such as long distance.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC.\n39\nM A NA G E M E N T ' S D I SCU S SI O N AN D ANAL Y S IS\nMANAGEMENT'S DISCUSSION AND ANALYSIS\nNetwork revenue was higher this year compared to last year. This was the net effect of:\nGLYPH<129> higher data revenue related to an increase in subscriber levels and higher usage of wireless data services\nGLYPH<129> partially offset by our introduction of new lower priced US and international roaming plans and rates which offer consumers more value, and\nGLYPH<129> the continued adoption of customer friendly simplified plans, which often bundle in certain features like voicemail, caller ID and long distance that we have charged for separately in the past.\nExcluding the decline in US and international roaming revenue this year, network revenue would have increased 1 % .\nData revenue was 17 % higher this year mainly because of the continued penetration and growing use of smartphones, tablet devices and wireless laptops, which increased the use of e-mail, wireless, Internet access, text messaging and other wireless data services. Data revenue represented approximately 47 % of total network revenue this year, compared to approximately 41 % last year.\nPostpaid churn was 1.24 % this year, compared to 1.29 % in 2012. The lower churn rate is partly attributable to the new simplified plans and the roaming plans we introduced.\nGross postpaid subscriber additions were 1.4 million this year, or 3 % lower than last year, which reduced net postpaid subscriber additions to 228,000, despite a lower postpaid churn. We believe the industry transition from three year to two year plans resulting from the recent adoption of the Canadian Radio-television and Telecommunications Commission (CRTC) Wireless Code may have slowed our overall wireless subscriber growth from the second half of the year. See 'Regulation in Our Industry' for more information on the Wireless Code.", - "page_start": 42, - "page_end": 43, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "DATA REVENUE GROWTH\nWHAT WE SAID: Generate double-digit wireless and broadband data growth consistent with our data usage monetization strategy.\nWHAT WE DID: Grew wireless and broadband data revenues by 17% and 16%, respectively over 2012 levels.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Higher Operating Revenue and Adjusted Operating Profit\nGLYPH<129> Consolidated operating revenue was 2 % higher this year compared to 2012, led by an increase in data revenue at Wireless, higher Internet revenue at Cable, higher Next Generation revenue at Business Solutions and higher subscriber revenue at Media. Revenue grew by 3 % in Cable, 7 % in Business Solutions and 5 % in Media, while revenue at Wireless remained unchanged as the increase in data revenue was offset by the decrease in voice revenue.\nGLYPH<129> Consolidated adjusted operating profit rose 3 % this year to $4,993 million, with consolidated adjusted operating profit margins of 39.3 % , resulting from higher revenue, the realization of cost efficiencies and shifts in the mix of revenue from products and services sold.\nGLYPH<129> Postpaid Wireless subscriber growth continued with net additions of 228,000 and lower churn of 1.24 % .\nGLYPH<129> Cable high-speed Internet subscribers grew by 97,000 and cable telephony lines grew by 79,000, while television households decreased by 87,000 compared to 2012.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "2002 compared to 2001\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the result of other wireless carriers executing additional leases to use space on the Company's portfolio of towers. Of the 82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.\nWireless revenues from the Company's paging operation were $0.3 million, a decrease of $0.1 million as the local customer base increasingly chose alternative digital wireless services. Paging service subscribers declined by 7.8% in 2002 from 3,190 subscribers to 2,940 subscribers.\nWithin wireline revenues, the Telephone operation contributed $22.5 million, an increase of $0.9 million, or 4.0%. Telephone access revenues were $10.9 million, an increase of $1.4 million or 14.8%. The growth in access revenues was driven by a 38.4% increase in access minutes of use on the Company's network and an increased percentage of minutes in the intrastate jurisdiction, where rates are higher than the interstate jurisdiction. On January 1, 2002 the Federal subscriber line charge (SLC) for residential customers increased from $3.50 to $5.00 per month. The SLC\n49\n■\n2003 ANNUAL REPORT", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "SUPERIOR ASSET MIX\nMajority of revenue and cash flow is generated from wireless and broadband services, the fastest growing segments of the telecommunications industry.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "HIGHER VALUE WIRELESS SUBSCRIBERS\nWHAT WE SAID: Continue the growth in our smartphone subscriber base to drive wireless data revenue and ARPU.\nWHAT WE DID: Activated nearly 2.7 million smartphones, helping bring smartphone penetration to 75% of postpaid subscriber base.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Revenue Recognition\nThe Company records equipment revenue from the sale of handsets and accessories to subscribers in its retail stores and to local distributors in its territories upon delivery. The Company does not record equipment revenue on handsets and accessories purchased from national third-party retailers, those purchased though the Company's business-tobusiness sales force, or directly from Sprint by subscribers in its territories. The Company believes the equipment revenue and related cost of equipment associated with the sale of wireless handsets and accessories is a separate earnings process from the sale of wireless services to subscribers. For competitive marketing reasons, the Company sells wireless handsets at prices lower than the cost. In certain instances the Company may offer larger handset discounts as an incentive for the customer to agree to a multi-year service contract. The Company also sells wireless handsets to existing customers at a loss in handset sales and the corresponding cost in cost of goods, and accounts for these transactions separately from agreements to provide customers wireless service. These transactions are viewed as a cost to retain the existing customers and deter churn.\nFor the Company's wireless customers that purchase and activate their service through a channel not covered by EITF 00-21, the wireless customers generally pay an activation fee to the Company when they initiate service. The Company defers the activation fee revenue (except when a special promotion reduces or waives the fee) over the average life of its subscribers, which is estimated to be 30 months. The Company recognizes service revenue from its subscribers as they use the service. The Company provides a reduction of recorded revenue for billing adjustments and the portion of revenue (8%) that is retained by Sprint. The Company also reduces recorded revenue for rebates and discounts given to subscribers on wireless handset sales in accordance with (\"EITF\") Issue No. 01-9 'Accounting for Consideration Given by a Vendor to a Subscriber (Including a Reseller of the Vendor's Products).' The Company\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n44\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES\nMANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS", - "page_start": 45, - "page_end": 46, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "General\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or plant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy of the Company is to grow and diversify the business by adding services and geographic areas that can leverage the existing plant, but to do so within the opportunities and constraints presented by the industry. For many years the Company focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary business within the Company. This initial diversification was concentrated in other wireline businesses, such as the cable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in the wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of the regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the Company's total revenue was generated by wireline operations, and initiatives were already underway to make wireless a more significant contributor to total revenues.\nDuring the 1990's significant investments were made in the cellular and PCS (wireless) businesses. The VA 10 RSA cellular operation, in which the Company held a 66% interest and was the general partner, experienced rapid revenue growth and excellent margins in the late 1990's. The cellular operation covered only six counties, and became increasingly dependent on roaming revenues. Management believed the roaming revenues and associated margins would be unsustainable as other wireless providers increasingly offered nationally-branded services with significantly reduced usage charges. To position it to participate in the newer, more advanced, digital wireless services, in 1995 the Company entered the PCS business through an affiliation with American Personal Communications (APC), initiating service along the Interstate 81 corridor from Harrisonburg, Virginia to Chambersburg, Pennsylvania. This territory was a very close match to the Company's fiber network, thereby providing economic integration that might not be available to other wireless carriers. In 1999, the Company entered a new affiliation arrangement with Sprint, the successor to APC (which introduced the Company to a nationally-branded wireless service) and expanded the PCS footprint further into Central Pennsylvania. The Company's combined capital investment in 2000 and 2001 in the PCS operation was $45.1 million.\n39\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS", - "page_start": 40, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nmarketing Sprint PCS. If financial difficulties are experienced by Sprint or any Affiliate, it could have an adverse impact on the Company's results. The Company's PCS network is part of Sprint's nationwide wireless network. The network is owned and operated by Sprint and its Affiliates. The financial viability of Sprint and its Affiliates is critical to the success of operating and\nThe current competitive nature of the wireless industry may prompt major wireless providers to strive for financial improvements through industry consolidation. Such consolidation could include Sprint. It is not clear to what extent consolidation may occur or which companies will be involved, but certain consolidation transactions may have an adverse impact on the operating results and valuation of the Company's wireless operations.\nThe Company's access revenue may be adversely impacted by legislative or regulatory actions that decrease access rates or exempt certain traffic from paying access to the Company's regulated telephone network. The Federal Communications Commission is currently reviewing the issue of Voice Over Internet Protocol (VOIP) as it relates to access charges. An unfavorable finding may have an adverse effect on the Company's telephone operations.\nThere has been a trend for incumbent local exchange carriers to see a decrease in access lines due to the effect of wireless and wireline competition, a slow down in the economy, and the elimination of a second line dedicated to dial up Internet as customers migrate to broadband connections. Although the Company has not seen a material reduction in its number of access lines to date, it experienced line decreases in each of the last two quarters. There is a significant risk that this trend could have a material adverse effect on the Company's telephone operations in the future.\nOn May 24, 2004, Local Number Portability (LNP) will be required in the Company's local wireline service area. The Company's customers will be able to retain their existing wireline phone number and use it to obtain service from a competing wireline or wireless provider in the service area. At this time, the Company cannot estimate the potential impact on its telephone operations. If a significant number of customers disconnect the Company's service, it will have an adverse impact on the Company's telephone operating results.", - "page_start": 56, - "page_end": 56, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "What has Rogers Communications done to improve its television platform?", - "target_page": 2, - "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "ROGERS COMMUNICATIONS\nRogers Communications (TSX: RCI; NYSE: RCI) is a diversi/fied Canadian telecommunications and media company. As discussed in the following pages, Rogers Communications is engaged in the telecom and media businesses through its primary operating segments Rogers Wireless, Rogers Cable, Rogers Business Solutions and Rogers Media.\nROGERS COMMUNICATIONS\nBUSINESS SOLUTIONS", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "MEDIA WIRELESS CABLE\nROGERS.COM\nROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "23\nMelinda M. Rogers* Senior Vice President, Strategy and Development, Rogers Communications", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "DIRECTORS OF ROGERS COMMUNICATIONS INC.\nAS OF FEBRUARY 11, 2014", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "WHAT'S NEXT? IF YOU'RE WITH ROGERS, YOU'LL BE THE FIRST TO KNOW.\nMEDIA WIRELESS CABLE\nROGERS.COM", - "page_start": 131, - "page_end": 131, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "FOLLOW ROGERS THROUGH THESE SOCIAL MEDIA LINKS\nFACEBOOK\nfacebook.com/rogers\nGOOGLE +\ngoogle.com/+Rogers\nREDBOARD\nredboard.rogers.com\nSOCIAL\nhttp://social.rogers.com\nTWITTER\ntwitter.com/rogersbuzz", - "page_start": 129, - "page_end": 129, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "22 Edward S. Rogers*\nDeputy Chairman and Executive Vice President, Emerging Business, Corporate Development, Rogers Communications\n* Management Directors are pictured on the following page.\n20 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements\nWe , us , our , Rogers , Rogers Communications and the Company refer to Rogers Communications Inc. and our subsidiaries. RCI refers to the legal entity Rogers Communications Inc., not including our subsidiaries. RCI also holds interests in various investments and ventures.", - "page_start": 97, - "page_end": 97, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "rogers.com/investors\nStay up-to-date with the latest Rogers investor information", - "page_start": 129, - "page_end": 129, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "BUSINESS SOLUTIONS\n10 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nIN TODAY'S FAST-PACED DIGITAL WORLD OF BUSINESS, THE ABILITY TO COMMUNICATE AND ACCESS INFORMATION ANYTIME, ANYPLACE IS A COMPETITIVE ADVANTAGE THAT BUSINESS PROFESSIONALS LOOK TO ROGERS TO PROVIDE. ROGERS ENSURES THE INFORMATION THAT DRIVES COMMERCE FORWARD IS ALWAYS ON HAND AND HELPS BUSINESSES DEFINE HOW TO WIN IN THE DIGITAL WORLD.\nRogers provides a single reliable source for advanced business-focused voice, Internet and data networking solutions designed specifically for the most demanding of wireless and wired commercial requirements.\nBusinesses across Canada rely on Rogers for its national wireless network, world-leading LTE technology, seamless global connectivity, and the broadest array of wireless applications and devices, because they know that their mobility and remote connectivity needs are always covered with the most advanced solutions available. Because Rogers\nknows how businesses work, we also offer a choice of specifically designed plans and options that allow users to share buckets of voice and data, connect directly with team members, establish wireless backup for point-of-sale and other systems, and roam frequently with cost certainty.\nFor hundreds of thousands of smaller businesses located in and around Rogers cable footprint, Rogers offers a compelling set of wired telephony and Internet solutions that provide enterprise-grade dependability and value. With voice, data, hosting and online security solutions built specifically for business, Rogers provides a single reliable source for innovative, dependable communications solutions that are backed up by around-the-clock live agent support.\nLarger enterprises also increasingly rely on Rogers to deliver corporatecritical voice, Internet, networking and managed data centre solutions\nacross its fibre-optic network that connects thousands of commercial and municipal buildings. These next generation on-net services for enterprise customers are backed by dedicated, around-the-clock support and connectivity to Rogers high-speed national fibre-optic backbone that provides redundancy as well as seamless connectivity into the United States and Europe.\nRogers also provides the most extensive set of advanced wireless machine-to-machine connectivity solutions which help businesses to increase productivity, reduce costs and optimize operations. As well, Rogers remains at the forefront of mobile commerce and electronic payments solutions in the Canadian market.\nBusinesses across Canada also connect with customers through Rogers leading media brands as the one-stop solution for all their local and national radio, television, online and print advertising needs.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 11", - "page_start": 13, - "page_end": 14, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "Until what NHL season will the Vancouver's ice hockey team be a Rogers Communications partner?", - "target_page": 39, - "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "NHL\nGLYPH<129> Advanced our strategy of delivering highly sought-after sports content anywhere, anytime, on any platform and strengthening the value of our sports brand by entering into an exclusive 12-year licensing agreement with the NHL which begins with the 2014-2015 season and grants Rogers the following:\n-national rights across television broadcasts, wireless and mobile tablets and Internet streaming\n-national rights to all regular season games, all playoff games and the Stanley Cup Final, and all special events and nongame events (e.g. NHL All-Star Game, NHL Draft) - in multiple languages\n-out-of-market rights for all regional games\n-ownership of all linear and digital highlights, including condensed games and video archives\n-NHL broadcast assets: Rogers to operate NHL Centre Ice and NHL Game Centre Live\n-sponsorship rights to the NHL Shield logo as an official partner of the NHL\n-Canadian representation of ad sales for NHL.com\n-ownership of all commercial inventories for the television broadcasts\n-rights to sublicense broadcasting rights to TVA and CBC\n-rights to use the Hockey Night In Canada brand through the CBC sublicense agreement.\nThrough this agreement, Rogers plans to provide Canadians with a unique viewing experience that will feature expanded pre- and postgame coverage of regular season and playoff games and other enhanced NHL content. We expect this agreement to drive Sportsnet subscriber growth and to provide highly sought after content in multiple languages across all of Rogers' platforms.\n48 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "MEDIA\nGLYPH<129> Exclusive NHL 12-year licensing agreement to broadcast national NHL games beginning with the 2014-2015 season was signed. The agreement grants Rogers the exclusive distribution of all national live and in-progress regular season and playoff games within Canada, in multiple languages, across all platforms. We executed separate agreements to sublicense certain of these broadcasting rights to TVA Sports and CBC.\nGLYPH<129> Sportsnet 360 was launched, which is comprised of the rebranded theScore assets. The acquisition of theScore received final regulatory approval in the first half of this year.\nGLYPH<129> Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons, continuing a 14-year network tradition as the regional television broadcaster of Canucks hockey. The new agreement features a comprehensive suite of multimedia rights including television, online and mobile, delivering up to 60 regular season Vancouver Canucks games each season. Sportsnet is also the official regional television broadcast rights holder for the Toronto Maple Leafs, Calgary Flames and Edmonton Oilers.\nGLYPH<129> Next Issue Canada, an innovative, all-you-can-read subscription digital magazine service that provides consumers with exclusive and unlimited access to a catalogue of more than 100 premium Canadian and US titles was launched. Next Issue Canada delivers access to our leading publishing brands alongside many of the most popular US magazine titles.\nGLYPH<129> The Shopping Channel launched a brighter, easier, and more engaging multi-channel retail experience and a refreshed on-air and online look, an all-new mobile app, special-themed programming and improved shipping. The leading interactive and only national Canadian multi-channel retailer also added on-air social media engagement, new leading brands and more celebrity guest appearances.\nGLYPH<129> Sportsnet announced an eight-year multi-platform broadcast rights extension with MLB Properties and MLB Advanced Media to show live and in-progress regular season and playoff baseball games and highlights within Canada.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC.\n35\nM A NA G E M E N T ' S D I SCU S SI O N AN D ANAL Y S IS\nMANAGEMENT'S DISCUSSION AND ANALYSIS", - "page_start": 38, - "page_end": 39, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "LEADING CONTENT\n12 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nROGERS IS COMMITTED TO DELIVERING WORLD-CLASS CONTENT AND EXPERIENCES TO CONSUMERS AND ADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY HAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA BRANDS WITH COMPELLING CONTENT THAT RESONATES WITH AUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE.\nToday, businesses across Canada connect with customers through Rogers category-leading television and radio assets, sports entertainment, televised and online shopping, publishing, and digital media properties as the one-stop solution for all their local and national advertising needs.\nRogers Media is Canada's premier combination of diversified broadcast, specialty, sports, print and online media assets which together touch nearly 90% of Canadians every week. This includes over 50 popular AM and FM radio stations across Canada. In television, it includes the seven station City network which broadcasts intensely local, urban-oriented\nprogramming across the country's largest markets, as well as five OMNI Television stations which deliver multilingual news, information and entertainment to Canada's multiple language communities.\nThe Sportsnet specialty network provides sports programming across Canada through its four regional television channels and its nationallydistributed Sportsnet ONE, Sportsnet World, and Sportsnet 360 stations. Rogers also owns other Canadian specialty television channels, including FX Canada, OLN, The Biography Channel and G4.\nThe Shopping Channel - Canada's only nationally televised and Internet shopping service - is a leading interactive multi-channel retailer, offering a vast assortment of exclusive products and top brand names. As one of Canada's most innovative and diversified retailers, it provides customers with exceptional selections in health/beauty, jewelry, home/lifestyle, fashion/accessories, and electronics.\nRogers also publishes many well-known consumer magazines, such as Maclean's, Chatelaine, FLARE, L'actualité, and Canadian Business, and is the leading publisher of a number of industry, medical and financial publications. Rogers also controls a suite of fast-growing digital media assets, including 90+ owned and 300+ premium partnership online sites, as well as the recently launched Next Issue Canada digital magazine platform which provides 100+ of North America's most celebrated titles on an unlimited anytime, anywhere basis.\nIn sports entertainment, Rogers owns the Toronto Blue Jays baseball team and Rogers Centre stadium, Canada's largest sports and entertainment facility and home field of the Blue Jays. Rogers also holds a 37.5% investment in Maple Leaf Sports & Entertainment which owns the NHL Maple Leafs, NBA Raptors, MLS Toronto FC and a number of other sports related assets.", - "page_start": 15, - "page_end": 16, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "MEDIA SEGMENT\nRogers Media is Canada's premier destination for category-leading television and radio broadcasting, sports entertainment, publishing, and digital media properties. Television assets include national City network which reaches more than 80% of Canadians, /five OMNI Television multilingual channels, seven regional and national Sportsnet channels, as well as specialty channels FX Canada, OLN, The Biography Channel and G4. Rogers Media also owns The Shopping Channel, Canada's only nationally televised and online shopping service. It operates more than 50 Canadian radio stations, publishes 50+ well known consumer and business magazines, and owns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball Club and Rogers Centre, Canada's largest sports and entertainment facility. Rogers also holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL Toronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.\n'ROGGEERRSS MADE CLEAR PROGRESS ON A NUMBER OF S STTRRAATTEGIC FRONTS, WHILE CONTINUING TO DELIVER S STTRONG RETURNS TO SHAREHOLDERS AND BUILDING U UPPOON THE COMPANY'S DEEP-ROOTED FOUNDATIONS FOORR TTHHE FUTURE BENEFIT OF ALL OUR STAKEHOLDERS.'\nALAN HORN, CPA, CA", - "page_start": 3, - "page_end": 5, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "S ignificant Developments\nGLYPH<129> Exclusive 12-year licensing agreement to broadcast national NHL games, beginning with the 2014-2015 season was signed. The agreement grants Rogers the exclusive distribution rights of all national regular season and playoff games within Canada, in multiple languages, across all platforms. At the same time, we executed separate agreements to sublicence certain of these broadcasting rights to TVA Sports and CBC.\nGLYPH<129> Strategic acquisitions of Score Media Inc. (theScore), Mountain Cablevision Ltd. (Mountain Cable), Blackiron Data ULC (Blackiron) and Pivot Data Centres were completed.\nGLYPH<129> Rogers First Rewards, a new loyalty program allowing customers to earn points on their eligible purchases and redeem them online for a wide selection of Rogers products and services, was launched in the Greater Toronto Area, Ottawa, Kingston, Sudbury and other cities throughout Ontario. We also received regulatory approval to launch a Rogers credit card which augments this loyalty program and will accelerate the rate at which customers earn points.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS\nRogers Communications (TSX: RCI; NYSE: RCI) is a diversi/fied Canadian telecommunications and media company. As discussed in the following pages, Rogers Communications is engaged in the telecom and media businesses through its primary operating segments Rogers Wireless, Rogers Cable, Rogers Business Solutions and Rogers Media.\nROGERS COMMUNICATIONS\nBUSINESS SOLUTIONS", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "CORPORATE PHILANTHROPY\nFor information relating to Rogers various philanthropic endeavours, refer to the 'About Rogers' section of rogers.com", - "page_start": 129, - "page_end": 129, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "DIRECTORS OF ROGERS COMMUNICATIONS INC.\nAS OF FEBRUARY 11, 2014", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "MEDIA WIRELESS CABLE\nROGERS.COM\nROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Higher Operating Expenses\nWe assess Media operating expenses in four areas:\nGLYPH<129> the cost of broadcast content (including sports programming)\nGLYPH<129> the cost of retail products sold by The Shopping Channel and Sports Entertainment\nGLYPH<129> Blue Jays player payroll\nGLYPH<129> all other expenses involved in day-to-day operations.\nOperating expenses were 8 % higher than 2012, mainly because of higher programming costs at Sportsnet, higher Toronto Blue Jays player salaries, higher merchandise spending at The Shopping Channel and costs associated with our launch of Next Issue Canada.\nThe higher programming costs this year are a combination of lower costs in 2012 because of the NHL player lockout, and higher costs this year because more hockey games than normal were aired because of the compressed NHL hockey schedule due in part to upcoming winter Olympics. Approximately $62 million of Media's year over year increase in operating expense this year resulted from the 2012 NHL lockout and the timing of games aired in 2013. Player salaries at the Toronto Blue Jays were $34 million higher this year.", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "I am a shareholder of Emmis Communication, but I will be available from the 20th of June to the 4th of July, will the Annual Meeting take place during this period?", - "target_page": 6, - "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Annual Meeting\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis' Corporate office.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Outperform\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "The year ahead\nThat last point - innovation - is an important one, especially for the future of Emmis, because we are planning something\nthat could change the face of American TV and once again demonstrate that Emmis is a company that leads the way.\nForty years ago, Americans began taking down their TV antennas and severing broadcasters' direct link to television audiences. Since then, the cable companies-the middlemen who replaced us-have created more than $300 billion of value for themselves. However, changes in technology have given broadcasters the ability to provide the American public with the most popular TV channels, without the middlemen and at a more reasonable price.\nWe are developing an innovative model that will leverage that technology to get broadcast companies back into the game. I believe it has the potential to revolutionize the television industry. I also believe it will add substantial value to your investment.\nWe unveiled this concept at the National Association of Broadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to express their support for what we're calling the Broadcasters' Initiative, and more are signing on each week. Once again, Emmis has leveraged innovation to take a leading role in our industries.\nWe'll continue to use innovation to push us forward. Meanwhile, we'll also build and maintain the best teams, produce the best media content, outhustle and outsell our competitors, seize the best opportunities and operate this company better than any other.\nIn other words, you can count on Emmis to continue to do what it has always done: Outperform.\nThank you for your belief and investment in Emmis.\nJeffrey H. Smulyan\nchairman & ceo emmis communications", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Form 10-K\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, 2004, which was filed with the Securities and Exchange Commission, will be sent to shareholders without charge upon written request to Kate Healey, Emmis Communications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204, or ir@emmis.com.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "about emmis\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM domestic radio stations serving the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television stations, award-winning regional and specialty magazines, a radio network, international radio interests, and ancillary businesses in broadcast sales and publishing.\nEmmis was founded in 1980, and the company launched its first radio station, WENS-FM, in July 1981. As Emmis (the Hebrew word for 'truth') acquired more radio stations across the nation, it established a reputation for sound operations and emerged as a radio industry leader and innovator. Emmis was the first broadcast company to own toprated radio stations in both L.A. and New York, and it pioneered such concepts as the all-sports format.\nThe company launched its magazine division in 1988 with the purchase of Indianapolis Monthly , and moved into the world of international radio in 1997, when it was awarded a license to operate a national radio network in Hungary. In 1998, Emmis expanded into television by buying six television stations in markets throughout the United States. In the last six years, the company has added properties in each of its divisions.\nWith its emphasis on solid operations, integrity, community involvement and fun, the company's culture has been repeatedly lauded by both its employees and its peers. Trade publications have regularly cited the company's leaders as being among the best in the business.\nEmmis became a public company in 1994. It maintains its worldwide headquarters in Indianapolis, where the company was founded.\nThis annual report contains certain non-GAAP measures. For a presentation of the directly comparable GAAP measure and a reconciliation of the non-GAAP measures to the GAAP measures, see the attachment to the back of our Form 10-K in this Annual Report.", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "ANNUAL MEETING\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The meeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company's offices at the Shentel Center, 500 Mill Road, Edinburg, Virginia.", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "ANNUAL MEETING\nThe Company's annual shareholders' meeting will be held at 10:30 a.m. on May 4, 2004, at the Holiday Inn, Highways 61 & 38 North, Muscatine, Iowa. Shareholders and other interested investors are encouraged to attend the meeting.", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Annual General Meeting\nAll shareholders are encouraged to attend and participate in the Company's Annual General Meeting. Shareholders may attend in person or send a proxy as their representative.\nThe Company's external auditor is routinely invited to and attends the Annual General Meeting in order to respond to questions raised by shareholders relating to the content and conduct of the audit and accounting policies adopted by the Company in relation to the preparation of the financial statements.", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Provided that-\n(i) a m em ber nom inated under paragraph ( e ) m ay be rem oved from office by the rest of the m em bers of the C om m ission acting together only for inability of the m em ber to discharge the functions of his or her office w hether arising from infirm ity of m ind or body or any other cause or for gross m isbehaviour; or\n(ii) a m em ber appointed under paragraph ( f ) m ay be rem oved from office by the President only for inability of the m em ber to discharge the functions of his or her office w hether arising from infirm ity of m ind or body or any other cause or for gross m isbehaviour.\n(3) A m em ber of the C om m ission shall not enter upon the duties of his or her office until he or she has taken and subscribed such oath for the due execution of his or her office as m ay be prescribed by P arliam ent.\n(4) The Judicial S ervice C om m ission shall not be subject to the direction or control of any other person or authority in the exercise of its functions under this C onstitution.\n(5) The C om m ission m ay regulate its ow n procedure and, subject to that procedure, m ay act notw ithstanding any vacancy in its m em bership or the absence of\nC opyright G overnm ent of B otsw ana\nany m em ber and its proceedings shall not be invalidated by the presence or participation of any person not entitled to be present at or to participate in those proceedings.\n(6) The decisions of the C om m ission shall be by the vote of a m ajority of the m em bers present, and in the event of an equality of votes, the C hairm an shall have a casting vote.", - "page_start": 44, - "page_end": 45, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Board of Directors\nJeffrey H. Smulyan Chairman of the Board, President and Chief Executive Officer\nSusan B. Bayh\nFormer Commissioner of the International Joint Commission of the United States and Canada\nWalter Z. Berger\nExecutive Vice President,\nChief Financial Officer and Treasurer\nGary L. Kaseff Executive Vice President, General Counsel\nRichard A. Leventhal\nPresident and Majority Owner,\nLMCS, LLC\nPeter A. Lund\nMedia consultant and former President of CBS Inc.\nGreg A. Nathanson Media consultant and former President of Fox Television Stations and Emmis Television\nFrank V. Sica\nSenior Advisor\nSoros Fund Management LLC\nLawrence B. Sorrel Managing Partner and Co-CEO Tailwind Capital Partners\nemmis entities, 1 = St. Louis. emmis", - "page_start": 5, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "Who is the President of the TV Department of Emmis Communications?", - "target_page": 6, - "target_passage": "Randall Bongarten Television Division President", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Outperform\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "The year ahead\nThat last point - innovation - is an important one, especially for the future of Emmis, because we are planning something\nthat could change the face of American TV and once again demonstrate that Emmis is a company that leads the way.\nForty years ago, Americans began taking down their TV antennas and severing broadcasters' direct link to television audiences. Since then, the cable companies-the middlemen who replaced us-have created more than $300 billion of value for themselves. However, changes in technology have given broadcasters the ability to provide the American public with the most popular TV channels, without the middlemen and at a more reasonable price.\nWe are developing an innovative model that will leverage that technology to get broadcast companies back into the game. I believe it has the potential to revolutionize the television industry. I also believe it will add substantial value to your investment.\nWe unveiled this concept at the National Association of Broadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to express their support for what we're calling the Broadcasters' Initiative, and more are signing on each week. Once again, Emmis has leveraged innovation to take a leading role in our industries.\nWe'll continue to use innovation to push us forward. Meanwhile, we'll also build and maintain the best teams, produce the best media content, outhustle and outsell our competitors, seize the best opportunities and operate this company better than any other.\nIn other words, you can count on Emmis to continue to do what it has always done: Outperform.\nThank you for your belief and investment in Emmis.\nJeffrey H. Smulyan\nchairman & ceo emmis communications", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Form 10-K\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, 2004, which was filed with the Securities and Exchange Commission, will be sent to shareholders without charge upon written request to Kate Healey, Emmis Communications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204, or ir@emmis.com.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "about emmis\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM domestic radio stations serving the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television stations, award-winning regional and specialty magazines, a radio network, international radio interests, and ancillary businesses in broadcast sales and publishing.\nEmmis was founded in 1980, and the company launched its first radio station, WENS-FM, in July 1981. As Emmis (the Hebrew word for 'truth') acquired more radio stations across the nation, it established a reputation for sound operations and emerged as a radio industry leader and innovator. Emmis was the first broadcast company to own toprated radio stations in both L.A. and New York, and it pioneered such concepts as the all-sports format.\nThe company launched its magazine division in 1988 with the purchase of Indianapolis Monthly , and moved into the world of international radio in 1997, when it was awarded a license to operate a national radio network in Hungary. In 1998, Emmis expanded into television by buying six television stations in markets throughout the United States. In the last six years, the company has added properties in each of its divisions.\nWith its emphasis on solid operations, integrity, community involvement and fun, the company's culture has been repeatedly lauded by both its employees and its peers. Trade publications have regularly cited the company's leaders as being among the best in the business.\nEmmis became a public company in 1994. It maintains its worldwide headquarters in Indianapolis, where the company was founded.\nThis annual report contains certain non-GAAP measures. For a presentation of the directly comparable GAAP measure and a reconciliation of the non-GAAP measures to the GAAP measures, see the attachment to the back of our Form 10-K in this Annual Report.", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Board of Directors\nJeffrey H. Smulyan Chairman of the Board, President and Chief Executive Officer\nSusan B. Bayh\nFormer Commissioner of the International Joint Commission of the United States and Canada\nWalter Z. Berger\nExecutive Vice President,\nChief Financial Officer and Treasurer\nGary L. Kaseff Executive Vice President, General Counsel\nRichard A. Leventhal\nPresident and Majority Owner,\nLMCS, LLC\nPeter A. Lund\nMedia consultant and former President of CBS Inc.\nGreg A. Nathanson Media consultant and former President of Fox Television Stations and Emmis Television\nFrank V. Sica\nSenior Advisor\nSoros Fund Management LLC\nLawrence B. Sorrel Managing Partner and Co-CEO Tailwind Capital Partners\nemmis entities, 1 = St. Louis. emmis", - "page_start": 5, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Annual Meeting\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis' Corporate office.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Board of Directors\nWRKS-FM(98.7), Classic Soul/Today's R&B Phoenix, 1 = Mobile, Ala./Pensacola, Fla., WBPG-TV (Channel. WRKS-FM(98.7), Classic Soul/Today's R&B Phoenix, 2 = RELATED BUSINESSES. KKFR-FM(92.3), Rhythmic CHR, 1 = 55), WB programming. KKFR-FM(92.3), Rhythmic CHR, 2 = Emmis Books. KKLT-FM (98.7), Adult Contemporary, 1 = New Orleans, WVUE-TV (Channel 8),. KKLT-FM (98.7), Adult Contemporary, 2 = Emmis Interactive. KMVP-AM (860), Sports, 1 = Fox programming/local news. KMVP-AM (860), Sports, 2 = RDS. KTAR-AM (620), News/Talk/Sports, 1 = Omaha, Neb., KMTV-TV (Channel 3),. KTAR-AM (620), News/Talk/Sports, 2 = . , 1 = CBS programming/local news. , 2 = \nemmis communications one emmis plaza 40 monument circle indianapolis, indiana 46204", - "page_start": 6, - "page_end": 7, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Rogers Communications is one of Canada's leading diversified communications and media companies.\nWe provide a broad range of services: wireless and wired voice and data communications, cable television, high-speed Internet, cable telephony, wired telecom and data networking services to consumers and businesses. We also compete in television and radio broadcasting, multi-platform shopping, sports media and entertainment, digital media and consumer, trade and professional publications.\nAlmost all of our operations and sales are in Canada. We have a highly skilled and diversified workforce of approximately 28,000 employees. Our head-office is in Toronto, Ontario and we have numerous offices across Canada.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Business\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with awardwinning radio broadcasting, television broadcasting and magazine publishing operations. Emmis' 23 FM and 4 AM domestic radio stations serve the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. The company's 16 television stations are located in Albuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; Mobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; Terre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles and Country Sampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio network in Hungary; operates nine FM radio stations serving more than 50 percent of the population in the Flanders region of Belgium; and has ancillary businesses in broadcast sales, publishing and interactive products.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "68. Tenure of office of M em bers\n(1) The seat of an E lected M em ber or a S pecially E lected M em ber of the N ational A ssem bly shall becom e vacant-\n( a ) upon the dissolution of P arliam ent;\n( b ) if he or she is absent from the sittings of the A ssem bly for such period and in such circum stances as m ay be prescribed in the rules of procedure of the Assem bly;\n( c ) subject to the provisions of subsections (2) to (3) of this section, if any circum stances arise that, if he or she w ere not a M em ber of the A ssem bly, w ould cause him or her to be disqualified for election thereto.\n(2) If circum stances such as are referred to in paragraph ( c ) of the preceding subsection arise in relation to a M em ber of the A ssem bly by virtue of the fact that he or she is declared insolvent, adjudged to be of unsound m ind, sentenced to death or im prisonm ent, or convicted of an election offence and it is open to the M em ber to appeal against the decision (either w ith the leave of the court or other authority or w ithout such leave), he or she shall forthw ith cease to perform his or her functions as a M em ber of the Assem bly but, subject to the next follow ing subsection, he or she shall not vacate his or her seat until the expiration of a period of 30 days thereafter:\nProvided that the S peaker m ay, at the request of the M em ber, from tim e to tim e extend that period for further periods of 30 days to enable the M em ber to pursue an appeal against the decision, so, how ever, that extensions of tim e exceeding in the aggregate 150 days shall not be given w ithout the approval of the A ssem bly signified by resolution.", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "Does the radio station 93.7 in Austin belong to Emmis Communication?", - "target_page": 7, - "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "about emmis\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM domestic radio stations serving the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television stations, award-winning regional and specialty magazines, a radio network, international radio interests, and ancillary businesses in broadcast sales and publishing.\nEmmis was founded in 1980, and the company launched its first radio station, WENS-FM, in July 1981. As Emmis (the Hebrew word for 'truth') acquired more radio stations across the nation, it established a reputation for sound operations and emerged as a radio industry leader and innovator. Emmis was the first broadcast company to own toprated radio stations in both L.A. and New York, and it pioneered such concepts as the all-sports format.\nThe company launched its magazine division in 1988 with the purchase of Indianapolis Monthly , and moved into the world of international radio in 1997, when it was awarded a license to operate a national radio network in Hungary. In 1998, Emmis expanded into television by buying six television stations in markets throughout the United States. In the last six years, the company has added properties in each of its divisions.\nWith its emphasis on solid operations, integrity, community involvement and fun, the company's culture has been repeatedly lauded by both its employees and its peers. Trade publications have regularly cited the company's leaders as being among the best in the business.\nEmmis became a public company in 1994. It maintains its worldwide headquarters in Indianapolis, where the company was founded.\nThis annual report contains certain non-GAAP measures. For a presentation of the directly comparable GAAP measure and a reconciliation of the non-GAAP measures to the GAAP measures, see the attachment to the back of our Form 10-K in this Annual Report.", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Outperform\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Business\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with awardwinning radio broadcasting, television broadcasting and magazine publishing operations. Emmis' 23 FM and 4 AM domestic radio stations serve the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. The company's 16 television stations are located in Albuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; Mobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; Terre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles and Country Sampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio network in Hungary; operates nine FM radio stations serving more than 50 percent of the population in the Flanders region of Belgium; and has ancillary businesses in broadcast sales, publishing and interactive products.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Form 10-K\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, 2004, which was filed with the Securities and Exchange Commission, will be sent to shareholders without charge upon written request to Kate Healey, Emmis Communications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204, or ir@emmis.com.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Board of Directors\nWRKS-FM(98.7), Classic Soul/Today's R&B Phoenix, 1 = Mobile, Ala./Pensacola, Fla., WBPG-TV (Channel. WRKS-FM(98.7), Classic Soul/Today's R&B Phoenix, 2 = RELATED BUSINESSES. KKFR-FM(92.3), Rhythmic CHR, 1 = 55), WB programming. KKFR-FM(92.3), Rhythmic CHR, 2 = Emmis Books. KKLT-FM (98.7), Adult Contemporary, 1 = New Orleans, WVUE-TV (Channel 8),. KKLT-FM (98.7), Adult Contemporary, 2 = Emmis Interactive. KMVP-AM (860), Sports, 1 = Fox programming/local news. KMVP-AM (860), Sports, 2 = RDS. KTAR-AM (620), News/Talk/Sports, 1 = Omaha, Neb., KMTV-TV (Channel 3),. KTAR-AM (620), News/Talk/Sports, 2 = . , 1 = CBS programming/local news. , 2 = \nemmis communications one emmis plaza 40 monument circle indianapolis, indiana 46204", - "page_start": 6, - "page_end": 7, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "The year ahead\nThat last point - innovation - is an important one, especially for the future of Emmis, because we are planning something\nthat could change the face of American TV and once again demonstrate that Emmis is a company that leads the way.\nForty years ago, Americans began taking down their TV antennas and severing broadcasters' direct link to television audiences. Since then, the cable companies-the middlemen who replaced us-have created more than $300 billion of value for themselves. However, changes in technology have given broadcasters the ability to provide the American public with the most popular TV channels, without the middlemen and at a more reasonable price.\nWe are developing an innovative model that will leverage that technology to get broadcast companies back into the game. I believe it has the potential to revolutionize the television industry. I also believe it will add substantial value to your investment.\nWe unveiled this concept at the National Association of Broadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to express their support for what we're calling the Broadcasters' Initiative, and more are signing on each week. Once again, Emmis has leveraged innovation to take a leading role in our industries.\nWe'll continue to use innovation to push us forward. Meanwhile, we'll also build and maintain the best teams, produce the best media content, outhustle and outsell our competitors, seize the best opportunities and operate this company better than any other.\nIn other words, you can count on Emmis to continue to do what it has always done: Outperform.\nThank you for your belief and investment in Emmis.\nJeffrey H. Smulyan\nchairman & ceo emmis communications", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Annual Meeting\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis' Corporate office.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "what it has always done: outperform.\nIn addition, we commit ourselves to creating the best content in our markets. Our magazines routinely dominate their industry awards ceremonies - last year, Texas Monthly won a coveted National Magazine Award, and Emmis publications claimed more than half of the awards at the City and Regional Magazine competition. Our radio stations feature some of the industry's most popular personalities - in 2003, Emmis people and stations were awarded three Marconi Radio Awards. And our television operations are regularly honored by journalism organizations for their news gathering and community service. In short, we provide our markets with reliable, high-quality content - content that helps us assemble the audiences our advertisers want to reach.\nWe then generate revenue by overallocating to sales. We give our teams well-developed strategies, clearly defined brands and solid products. We build bigger, better sales forces and put a greater emphasis on local dollars than our competitors. We hire aggressive managers, set ambitious goals and then watch our people work harder and smarter than anyone else.\nWe also seize the right opportunities and make the most of them. As the cost of buying radio properties has gone through the roof, we have been careful about buying. However, when we had a chance to acquire the LBJ stations in Austin, we knew it was the right fit: good stations, a tremendous heritage and a great culture, all with an opportunity for growth. And we've already built on that group's track record - since we bought them, we've reformatted one station and quickly sent it to No. 1 in the market, and we've pushed revenues up 9 percent for the entire group.\nFinally, we innovate. Why has Emmis, traditionally a radio company, become the company to emulate in TV? Because we approached TV in a way it's never been approached before. Why do we operate leading hip-hop stations in markets across the nation? Because we pioneered the concept. Why have we created a new 'Music with Class' format in St. Louis' Red 104.1? Because we believe we see a new opportunity. We know that successful companies don't follow the pack. They lead it, and that's what we'll always do.", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Introduction\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint Commission, the Accreditation Council for Graduate Medical Education, and the Association of American Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality handoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The EM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly adhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with adverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high risk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EMelectronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal medicine leadership of the study site collaboratively developed and launched a mandatory, EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for realtime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal evaluation of new EM-to-IP handoff notes through random medical record review and unstructured clinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of the handoff notes.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "emmis communications 2004 abbreviated financial highlights\nin thousands except where noted\nnet revenues, '00 = 325,265. net revenues, '01 = 473,345. net revenues, '02 = 539,822. net revenues, '03 = 562,363. net revenues, '04 = 591,868. station operating income*, '00 = 125,477. station operating income*, '01 = 174,213. station operating income*, '02 = 185,665. station operating income*, '03 = 213,112. station operating income*, '04 = 220,445. station op income margin, '00 = 38.6%. station op income margin, '01 = 36.8%. station op income margin, '02 = 34.4%. station op income margin, '03 = 37.9%. station op income margin, '04 = 37.2%. leverage, '00 = 2.5x. leverage, '01 = 6.8x. leverage, '02 = 9.3x. leverage, '03 = 6.5x. leverage, '04 = 6.7x\n*excluding noncash compensation\nradio\nstation operating income,\nexcluding noncash compensation\ntv\npublishing\nDear Shareholders,\nOn our year-end conference call, I said that last year was the best in Emmis Communications' history. And while that might have sounded like the usual Wall Street hyperbole - like any other CEO bragging about his company's performance - the difference is, I believed it. And I still do.\nBut I've been in this business long enough to know two things for sure: What I believe is not as important as what I can prove, and what we did last year is only meaningful if it reflects on how we will do in the coming year. The good news is, Emmis does have the results to back up my high praise, and what we did to perform last year does directly relate to how we'll perform in the year ahead.", - "page_start": 2, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "What are the two components considered in the expected free energy?", - "target_page": 4, - "target_passage": "The former (utilitarian) objective is to realize one’s preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensa- tions (encoded as “priors over observations” in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce uncertainty about one’s estimated state", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "2. Active Inference with POMDPs\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This should familiarise the reader with the vernacular used in the later sections regarding the functionalities of the package. While various extensions, such as structure learning, which enables an agent to learn the structure or shape of its environment through model comparison [44-47], or hierarchical and temporally deep POMDPs [48,49], are relevant for future work, describing these in detail is beyond the scope of this foundational paper.\nAt the core of AIF lies the minimisation of a variational free energy upper bound on surprise for perception, as well as action. This is motivated by the free energy principle [4-8], which states that self-organising systems can be described as minimising the variational free energy of their sensory states. The minimisation of free energy generally takes two\n4 of 33\nEntropy 2025 , 27 , 62\n5 of 33\nquantities as its target: the variational free energy ( VFE ) in the case of perception and the expected free energy ( EFE ) in the case of action. The VFE is the free energy associated with a given sensory observation and is resolved perceptually by updating beliefs about the environment. The EFE is the free energy that is expected in the future, contingent on a given policy or course of action. Choosing action policies associated with a low EFE lead to reducing uncertainty about the environment, as well as making preferred observations more likely.", - "page_start": 3, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Abbreviations\nThe following abbreviations are used in this manuscript:\nAIF\nActive inference\nFEP\nFree energy principle\nVFE\nVariational free energy\nEFE\nExpected free energy\nMCMC\nMarkov Chain Monte Carlo\nPOMDP\nPartially Observed Markov Decision Process", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "CLIMB PERFOLWANCE\nDuring climbing flight, the airplane gains potential energy by virtue of elevation. This increase in potential energy during a climb is provided by one, or a combination, of two means: (1) expenditure of propulsive energy above that required to maintain level flight or (2) expenditure of airplane kinetic energy, i.e., loss of velocity by a zoom. Zooming for altitude is a transient process of trading kinetic energy for potential energy and is of considerable importance for airplane configurations which can operate at very high levels of kinetic energy. However, the major portions of climb performance for most airplanes is a near steady process in which additional propulsive energy is converted into potential energy. The fundamental parts of airplane climb performance involve a flight condition where the airplane is in equilibrium but not at constant altitude.", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe second stage of our coarse-graining procedure consists in applying LPT, in order to deduce the best analytical model of electrolyte solutions which reproduces this molecular description. The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the difference between them treated as a perturbation in the reference potential. Assuming pairwise additive potentials, V ij = V (0) ij + ∆V ij , a first-order truncated expression for the free energy density of the system βf v is obtained,\nβf v /lessorsimilar βf (0) v + 1 2 β ∑ i,j ρ i ρ j ∫ d r g (0) ij ( r ) ∆V ij ( r ) (1)\nwhich depends only on the free-energy density f (0) v and RDF g (0) of the reference fluid, with β = ( k B T ) -1 and ρ i the concentration of species i . The Gibbs-Bogoliubov inequality [15] ensures that the right-hand side of Eq. (1) is actually a strict upper bound. Once a reference system has been chosen, the expression on the right-hand side of Eq. (1) must be minimized with respect to the parameters defining the reference. This procedure yields the best first-order approximation to the free energy of the system under consideration.\nFor a system of charged particles in solution, the natural reference is the PM, defined in terms of the charge and diameter ( σ i ) of each species. In this case, the perturbing potentials are just the short-range effective potentials computed above (∆ V ij = V SR ij ). We use the MSA [3] solution to the PM, since it provides analytical expressions for both the free energy and the RDF. The perturbation term is evaluated using an exponential approximation to the RDF obtained within the MSA, g ( r ) = exp [ g MSA ( r ) -1], which removes any unphysical negative regions and improves the comparison with HNC calculations.\nΦ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "B. Dynamical Density Functional theory\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related to its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. This implies that (i) no liquid can be transported to a site on the surface already filled with liquid, i.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to distinguish between the influence of the short- and the long-range parts of the interactions with the substrate, as all such interactions are absorbed into the effective chemical potential.\nHowever, using dynamical density functional theory (DDFT) [78-83] one can develop a model for the processes in the ultrathin postcursor film without these limitations, although here we limit ourselves to developing the theory at the level of the KMC and solely discuss how to extend it to incorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes the coupled dynamics of the density fields of the liquid ρ l and the nanoparticles ρ n . The densities ρ l and ρ n are defined as the probabilities of finding a given lattice site on the surface to be occupied by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond to number densities as we use the lattice spacing σ = 1 as our unit of length.\nTo develop the DDFT, one must first derive the underlying free energy functional F [ ρ l , ρ n ] , and secondly, devise dynamical equations for both density fields that account for the conserved and the non-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. For a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) approximation for the free energy of the system [78, 84] which contains an entropic contribution and contributions from the interactions between the different species (nanoparticles and liquid). The free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is coupled to a reservoir with chemical potential µ ), whereas the nanoparticles are treated in the\n14\ncanonical ensemble. The free energy functional is first defined on the original KMC lattice. However, after re-writing the interaction terms employing gradient operators [78] one finally obtains the free energy functional for a continuous system", - "page_start": 13, - "page_end": 14, - "source_file": "1001.2669.pdf" - }, - { - "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\n(2) The total energy of the air stream in the tube is unchanged. However, the airstream energy may be in two forms. The airstream may have a potential energy which is related by the static pressure and a kimtic energy by virtue of mass and motion. As the total energy is unchanged, an increase in velocity (kinetic energy) will be accompanied by a decrease in static pressure (potential energy). This situation is analagous to a ball rolling along-a smooth surface. As the ball rolls downhill, the potential energy due to position is exchanged for kinetic energy of motion. If .frictionwere negligibie, the change of potential energy would equal the change in ki,netic energy. This- is also the case for the airflow within the tube.\nThe relationship of static pressure and velocity is maintained throughout the length of the tube. As the flow moves past the constriction toward station 3, the velocity decreases and the static pressure increases.\nThe Bernoulli equation for incompressible flow is most readily explained ,by accounting for the energy of the~airflow within the tube. As the airstream has no energy added or subtracted at any point, the sum of the potential +id kinetic energy must be constant. The kinetic energy of an object is found by:\n'KE. =%MV=\nwhere K;E. = kinetic energy, ft.-lbs.\nM = mass, slugs\nV'=velocity, ft./set.\nThe kinetic energy of a cubic foot of air is:\nK&x,,\nwhere g= kinetic energy per cu. ft., psf p=air density, slugs per cu. ft. V=ait velocity, ft./set.\nNAWEPS DD-BDT-BD BASIC AERODYNAMICS\nNAVWEPS 00-ROT-80 BASIC AERODYNAMICS\nFigure 1.3. Variation o\\ Pressure in Tube\nIf the potential energy is represented by the static pressure, p, the sum of the potential and kinetic energy is the total pressure of the airstream.\nH=p+% P V' where H=total pressure, psf (sometimes referred to as 'head ' pressure) p=static pressure, psf. p=density, siugs per cu. ft. V= velocity, ft./set.", - "page_start": 23, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "3.2. Simulation with ActionModels\n✞ # Get all current belief states states = get_states(agent) # Get a specific state, like the expected free energies only efe = get_states(agent, \"expected_free_energies\") # Get history for all states history = get_history(agent) # Get history of expected free energies only history_efe = get_history(agent, \"expected_free_energies\") ✝\nAdditionally, a set of convenience functions can extract and set parameters and (histories of) beliefs. We briefly show how to extract the current or histories of past states:\nAnd how to change the parameters of a created agent:", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nTo overcome this difficulty, we have explicitly introduced the CIP in our model (species 3). Straightforward calculations, based on a characteristic-function formalism, allow us to define an equivalent model in which the free ions and the CIP are explicitly taken into account [19, 20]. We apply this formalism by defining a pair as an anion and a cation at a distance less than 4 ˚ A, which corresponds to the position of the effective potential maximum. The interaction between free, like charges in this new system remains unchanged, and the cation-anion interactions are easily approximated by ex-\n2\nFIG. 3: Effective pair potentials derived for MSA3 and BIMSA3. (a) Cation anion (dashed line: without taking the pair into account), (b) pair cation, (c) pair anion, and (d) pair pair. The internal potential of the pair β ˜ V int ( r ) is set equal to βV eff ij ( r ) for distances less than 4 ˚ A.\nrapolating the original potential at the barrier separating pairs from free ions (as shown in Fig. 3). We assume that the interaction potential is averaged over the rotational degrees of freedom of the CIP and thus pairwise additive. Hereafter, the quantities referring to such a three-component model are written with a tilda symbol. The short-range potentials involving the pair can be derived, in the infinite dilution limit, from an average of the contributing ion interactions. In Fourier space,\n˜ V SR 3 i ( k ) = w ( k / 2) [ V SR 1 i + V SR 2 i ] ( k ) , i = 1 , 2 (2a)\nwhere ˜ w ( r ) is the pair probability distribution\n˜ ˜ V SR 33 ( k ) = ˜ w ( k / 2) 2 [ V SR 11 + V SR 22 +2 V SR 12 ] ( k ) (2b)\n˜ w ( r ) = K -1 0 e -β ˜ V int ( r ) (2c)\n˜ V int ( r ) is the internal part of the pair potential (see Fig. 3), and K 0 is the association constant, defined as:", - "page_start": 1, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "2.2. Data Openness in EU\nThe European Cohesion Policy is only halfway to accomplishing a paradigm shift to open data, with differences in performance both between and - in some cases - within European Countries.\nThings don't go much better for the European Union in the energy field. Carlo Stagnaro wrote in EU Energy Orwellianism: Ignorance Is Strength:\nEnergy is an active area of EU public policy. Yet authorities are not revealing information (data is surely has) that is crucial to determine whether its policies are distorting the market and come at too high a cost to society. This is a major fault in Europe's credibility in advancing its policy goals, as well as a serious limitation to the accountability of the policy making process\nWe realized that, while strongly supporting green investments the EU does not know, or does not make it public, how much is spent every year on green subsidies... With regard to green jobs, several estimates exist, but no official figure is provided.\nMore recently... I discovered that Eurostat does not tell how much coal capacity is installed - as opposed to natural gas- or oil-fueled generation plants. It is possible to know how much coal is used, but not the amount of fixed capital which is invested in\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\n7/34\ncoal plants. If data are not available, every conclusion is questionable because it relies on assumptions or estimates.", - "page_start": 6, - "page_end": 7, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nActive inference is based on the idea that in order to engage in adaptive allostatic regulation and goal-directed behavior, living organisms continuously strive to minimize the surprise of their sensations or, more formally, an upper bound to surprise: variational free energy (Parr et al. 2022). Notably, the (expected) free energy minimization processes that drive active inference jointly consider two complementary objectives. The former (utilitarian) objective is to realize one's preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensations (encoded as 'priors over observations' in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce\nuncertainty about one's estimated state. This means that active inference agents tend to avoid ambiguous states, encompassing the avoidance of ambiguous places where self-localization is challenging, ambiguous social situations where safety is uncertain, and ambiguous bodily states, such as unsure feelings of fatigue. However, one apparent exception to this aversion to ambiguity arises when exploring novel states implies the opportunity to learn new things and enhance one's model; see Friston et al. (2017) for a discussion. Furthermore, and importantly, active inference agents will actively operate in the environment to reduce their ambiguity; for example, by actively seeking informative sensations that disambiguate in which location they are (e.g. by looking for traffic signs), whether their social context is safe or unsafe (e.g. by trying to understand other's intentions from their facial expressions and actions), or whether they are currently fatigued (e.g. by putting attention to one's heart), happy, or sad.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "How could the heart rate be estimated by means of an active inference paradigm?", - "target_page": 6, - "target_passage": "The second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The for- mer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor- mal” heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likeli- hood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\ninference that tracks the noise rather than the correct state of the estimated variable system (i.e. overfitting), whereas assigning excessively low weight to sensations (or excessively high weight to prior knowledge) makes the system poorly responsive to incoming observations that might signal a change in the state of the system-and both are examples of aberrant inference (Friston et al. 2014).\nFigure 2 provides a formal illustration of the above by plotting some examples of Bayesian inference using generative models under various levels of precision of the model components. For simplicity, we focus on a simplified example of inference of an interoceptive variable: one's heart rate. Heart rate is a 'hidden variable' in Bayesian parlance since it is not directly observable but needs to be inferred through two sources of information: prior knowledge about the most likely heart rate and sensory (heartbeat) observations. The top panel of Fig. 2 shows a series of (noisy) heartbeat observations. In the beginning, they are in the normal range for an adult (time steps 1-10), then they increase significantly, simulating tachycardia (time steps 11-20), then they go back to the normal range (time steps 21-30), then they decrease significantly, simulating bradycardia (time steps 31-40), and finally, they go back to the normal range (time steps 41-50).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nThe second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The former component is the prior, which encodes the person's a priori probabilistic belief (i.e. probability distribution) about her 'normal' heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likelihood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals. The results shown in the second panel of Fig. 2 show that Shannon surprise increases dramatically during episodes of tachycardia and bradycardia, which are far from the normal range. The pattern of results is the same across all levels of likelihood precision. However, the inference with a very high precision (a precision of 10) tracks more closely the noise sensory signals and can therefore lead to more extreme results.\nThe third panel shows the Bayesian surprise (or the KullbackLeibler divergence between posterior and prior probability distributions) over time. This is a measure of how much dissimilar the posterior and the prior are, and it always decreases as a result of inference, but note that it decreases much more rapidly when the precision of the likelihood is 10, which is another indication that the posterior is 'overfitting,' meaning that the inference result is excessively biased by the likelihood distribution.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nFinally, the two bottom series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high precision (of 10) and low precision (of 0.1) of the likelihood, respectively. In these plots, the prior distributions are in blue, the posterior distributions are in green, and the likelihoods are in red. It is possible to note that in the left (high precision) panels, the posterior inference closely follows the likelihood (it 'overfits') after five time steps and the inferred heart rate is slightly biased (i.e. it is 79). Differently, in the right (low precision) panels, the inference converges much slower to a high precision posterior, but without overfitting.\nThese simple examples of Bayesian inference illustrate two things. First, sensory observations that are unpredictable given\nModeling and controlling the body in maladaptive ways\n7\nFigure 2. A simplified example of (Bayesian) inference of one's heart rate. First panel: simulated time series of heartbeat observations. Second panel: Shannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a likelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10, see the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels: the two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high precision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of this figure.\nthe current model generate significant surprise, and sometimes, the surprise can remain relatively high for long periods before the model adapts (or the world changes), especially with some parameterizations of the generative model. This is particularly relevant in this context since active inference agents strive to minimize their surprise (and the long-term average of surprise, entropy, which is a measure of uncertainty) by changing their model, or changing the world, or both.", - "page_start": 5, - "page_end": 6, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nActive inference is based on the idea that in order to engage in adaptive allostatic regulation and goal-directed behavior, living organisms continuously strive to minimize the surprise of their sensations or, more formally, an upper bound to surprise: variational free energy (Parr et al. 2022). Notably, the (expected) free energy minimization processes that drive active inference jointly consider two complementary objectives. The former (utilitarian) objective is to realize one's preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensations (encoded as 'priors over observations' in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce\nuncertainty about one's estimated state. This means that active inference agents tend to avoid ambiguous states, encompassing the avoidance of ambiguous places where self-localization is challenging, ambiguous social situations where safety is uncertain, and ambiguous bodily states, such as unsure feelings of fatigue. However, one apparent exception to this aversion to ambiguity arises when exploring novel states implies the opportunity to learn new things and enhance one's model; see Friston et al. (2017) for a discussion. Furthermore, and importantly, active inference agents will actively operate in the environment to reduce their ambiguity; for example, by actively seeking informative sensations that disambiguate in which location they are (e.g. by looking for traffic signs), whether their social context is safe or unsafe (e.g. by trying to understand other's intentions from their facial expressions and actions), or whether they are currently fatigued (e.g. by putting attention to one's heart), happy, or sad.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "2.2. Perception in Active Inference\nIn AIF, perception is conceptualised as the result of variational (i.e., approximate) Bayesian inference, performed by minimising the VFE to optimise parameters of posterior beliefs about the environment. In exact Bayesian inference, we use a parametrised generative model m to make an optimal inference about state s of the environment based on observation o . This is performed by combining a prior belief over states p ( s | m ) ; a likelihood model p ( o | s , m ) ; and the model evidence p ( o | m ) , a normalisation term encoding the likelihood of receiving the given observations across all possible environmental states, as follows [1]:\np ( s | o , m ) = p ( o | s , m ) p ( s | m ) p ( o | m ) (1)\nThe posterior distribution over states given observations p ( s | o , m ) here represent the agent's beliefs about the environment. Forming beliefs in this way is thought to be the process that enables conscious, as well as unconscious, perception. The product of the likelihood model and prior is also called the joint likelihood p ( o , s | m ) , which fully defines the generative model, and which we use henceforth. In the following, for notational simplicity, we also omit denoting the dependency on the generative model m .\nCalculating the model evidence p ( o ) is often intractable, making exact Bayesian inference unfeasible. The way to circumvent this in AIF is to use a variational approximation to Bayesian inference [23,33,50,51]. This works by transforming the inference into an optimisation problem, specifically the minimisation of the VFE . First, an arbitrary probability distribution over environmental states q ( s ) , an approximate posterior that is used to approximate the exact posterior, is introduced. We then introduce the Kullback-Leibler (KL)\nEntropy 2025 , 27 , 62\n8 of 33\ndivergence between the approximate posterior q ( s ) and the exact posterior, which is also sometimes called the perceptual divergence:\nD KL [ q ( s ) ∥ p ( s | o )] = ∑ s q ( s ) ln q ( s ) p ( s | o ) (2)", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nare reciprocally linked through top-down connections that convey predictions (black edges) and bottom-up connections that convey prediction errors (red edges), within and across levels. This predictive coding architecture permits inferring (in the Bayesian sense) the most likely causes of sensations, across multiple modalities and multiple hierarchical levels, by minimizing prediction errors at all levels. The rationale is that predictions at all levels are continuously adjusted (and synaptic weights adjusted at a slower time scale) until they match with incoming multimodal stimuli sufficiently well, and, consequently, the prediction errors across all levels are minimized. This process entails that even if a predictive coding agent starts with an incorrect prediction (e.g. about what object it is looking at) the prediction errors that measure a discrepancy between the predicted sensations and the actual sensations can help revise the initial predictions. See Parr et al. (2022) for a more detailed explanation of how to interpret these schematics.\nAnother critical aspect of Fig. 1 is that it illustrates two pathways in which prediction errors at the proprioceptive and interoceptive levels are used to steer physical actions (reflex arcs) and autonomic actions (autonomic reflexes). Endowing predictive coding with these reflexes-hence realizing an 'active inference' architecture-permits minimizing prediction errors by changing the state of the world (by physically acting) or the internal milieu (by engaging in autonomic actions) rather than only by changing predictions, as described later.\nEquipped with a generative model like the one shown in Fig. 1, an active inference agent can continuously infer (and act upon) the state of the world and of the body, including the internal milieu, at multiple time scales. Of particular interest, here are multimodal inferences that unite exteroceptive and interoceptive sources of evidence. One example of this is the perception of faces expressing emotions. Two studies reported that\n6 Barca et al.", - "page_start": 4, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nThe last examples-disambiguating one's fatigue and emotional states-may seem strange if one assumes that we do have direct access to the body- and allostasis-related states (e.g. states of satiation, thirst, and fatigue) and to our emotions (e.g. we automatically know whether we are happy or sad). However, one assumption of active inference is that one's bodily and emotional states are not necessarily observable but, instead, 'hidden states' that need to be inferred on the basis of sensations (especially, but not exclusively, of interoceptive sensations from the inside of the body) and of an implicit, unconscious model of how the body functions (Barrett and Simmons 2015, Pezzulo et al. 2015, Seth and Friston 2016). In other words, the same inferential process that allows active inference agents to estimate the hidden state of the external environment (e.g. the presence or absence of an object in the environment) is also used to estimate other hidden states, such as fatigue, happiness, or sadness. This implies that one can also be wrong, or be fooled, about these states; for example, we could experience the 'interoceptive illusion' of feeling more fatigued than our physiological parameters would afford (Iodice et al. 2019).", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nIn general, the accuracy of the inference of hidden bodily states, the 'embodied self,' or other aspects of the model depends on the signal-to-noise ratio of the sensations and on the quality of the model. For example, it is difficult to self-localize in a city if it is dark (low signal-to-noise ratio) or if one does not know the city well (poor model). The inference of hidden bodily and emotional states might function in an analogous manner. If the quality of the afferent interoceptive (e.g. cardiac) signals is low, or if one has a poor model of how one's body functions, then it would estimate one's bodily states such as fatigue incorrectly (which in turn would also impair its adaptive regulation of the same bodily states). Interoceptive signals could be 'too noisy' for various reasons, which might be related to physiology, inflammation, or stress. The body model can be poor in various ways, too. For example, it could poorly characterize the statistical relations between interoceptive sensations and hidden bodily states (e.g. systematically mischaracterize high heart rate as caused by hunger but not fatigue or joy).\nFinally, there is a third essential element that determines the accuracy of the inference: precision control. In predictive coding, the influence of prediction errors on inference is weighted by their precision, i.e. inverse variance (pink triangles in Fig. 1). This weighting would ensure that very reliable sensations have more impact on inference than unreliable sensations. However, precision (like all other variables) needs to be estimated, but this might be incorrect. An incorrect setting of precisions has been associated with various psychopathological conditions, such as psychosis (Adams et al. 2013), eating disorders (Barca and Pezzulo 2020), panic disorders (Maisto et al. 2021), symptom perception (Pezzulo et al. 2019), depression (Barrett et al. 2016), and many others (Khalsa et al. 2018, Paulus et al. 2019). Intuitively, assigning excessively high weight to noisy sensations yields an incorrect", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "Statistical modeling & inference\nModel type and settings", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "Active inference, interoceptive processing, and uncertainty reduction\nSecond, these examples illustrate the importance of precision control and the appropriate setting of precision parameters in guiding inference. Remarkably, the inference can be more or less accurate or fast using the same data, depending on the precision parameters. Note that in Fig. 2, we manipulated only the precision of the likelihood. However, it would also be possible to manipulate the precision of the prior, together or in alternative to the precision of the likelihood. Generally speaking, when the precision of the\n8 Barca et al.\nprior is very high, the posterior will closely reflect the prior, rendering the inference rigid and incapable of adapting to changing environmental conditions-which might be especially problematic in periods of significant changes, such as adolescence or more simply when one changes city, working environment, and friends. Furthermore, as shown in Fig. 1, hierarchical predictive coding architectures have precision values associated with every hierarchical level (whereas, for simplicity, the inference shown in Fig. 2 is not hierarchical). The correct balance of precision parameters within and across layers is crucial for accurate inference, as it ensures that the correct levels of confidence are assigned to data and prior information.\nFinally, and importantly, aberrant precision control (as well as various combinations of other factors discussed earlier, such as noisy bodily sensations and poor bodily mode) can render inference not just incorrect but also highly ambiguous, leaving a person in a permanent condition of uncertainty about whether one is fatigued (when considering the bodily state), happy, or sad (when considering the emotional state), what kind of person one is or what are one's desires (when considering self-models), etc. Importantly, this condition of uncertainty is not limited to perceptual inference but has a cascade effect on decision-making and action selection. Indeed, an uncertain estimate of one's state automatically implies that one has low confidence in the effects of one's plans; for example, it renders more difficult the prediction of whether a run would be too fatiguing or a party too stressful. It is exactly this kind of uncertainty (about the present and the future, the body state or the outcomes of social interactions, etc.) that active inference agents strive to avoid.", - "page_start": 6, - "page_end": 7, - "source_file": "pubmed1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "At what stage of childhood does the construction of narrative identity take place?", - "target_page": 3, - "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "NSSI in adolescence\nAdolescence is the period of developmental transition from childhood to adulthood, which might be stretched up to the early 20s due to current sociocultural changes (e.g. delays in completing education, occupational attainment, and parenthood) (Patton et al. 2018). Among the challenges that adolescents have to face are the structuring of a 'narrative identity' or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time (McAdams and McLean 2013, McLean and Lilgendahl 2019). The definition of the new boundaries of adolescents' personal identity involves significant changes in the\n4 Barca et al.\nreciprocity with caregivers and peers. Thus, in parallel to the negotiation of identity with caregivers (through a relative detachment from them, a renegotiation of intimacy, and the questioning of their confirmatory authority), the modifications of friendship structures-from childhood to adolescence-lay the ground for the progressive recognition of social contexts and peer relationships as the elite territories for the modulation and exploration of personal identity. The redefinition that the adolescent has to face in these territories of exploration (of the self as an individual separated from the other and of the self with the other) might pass through a phase of reduced coherence in the narration of the self and hence an increased level of uncertainty. Coherence in the self's narrative is considered a measure of well-being and has been associated with psychopathology in adulthood (Klimstra and Denissen 2017) and adolescence (Lind et al. 2020, Shiner et al. 2021). For example, narrative incoherence has been found to be associated with personality disorders in adolescents (Lind et al. 2019), where 'identity diffusion' (e.g. feelings of emptiness and being fragmented and lack of a sense of continuity over time) might be considered an expression of high levels of uncertainty of the self.", - "page_start": 2, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "Create a user with administrative access\n1. Enable IAM Identity Center.\nFor instructions, see Enabling AWS IAM Identity Center in the AWS IAM Identity Center User Guide .\n2. In IAM Identity Center, grant administrative access to a user.\nFor a tutorial about using the IAM Identity Center directory as your identity source, see Configure user access with the default IAM Identity Center directory in the AWS IAM Identity Center User Guide .", - "page_start": 14, - "page_end": 14, - "source_file": "serverless-core.pdf" - }, - { - "text": "Create a user with administrative access\n1. Enable IAM Identity Center.\nFor instructions, see Enabling AWS IAM Identity Center in the AWS IAM Identity Center User Guide .\n2. In IAM Identity Center, grant administrative access to a user.\nFor a tutorial about using the IAM Identity Center directory as your identity source, see Configure user access with the default IAM Identity Center directory in the AWS IAM Identity Center User Guide .", - "page_start": 41, - "page_end": 41, - "source_file": "serverless-core.pdf" - }, - { - "text": "Credit Capacity and Commitments\nPlans for our Manhattan full-line store, which we currently expect to open in late 2018 to 2019, ultimately include owning a condominium interest in a mixed-use tower and leasing certain nearby properties. As of January 31, 2015, we had approximately $125 of fee interest in land, which is expected to convert to the condominium interest once the store is constructed. We have committed to make future installment payments based on the developer meeting pre-established construction and development milestones. Our fee interest in the land is currently and will continue to be subject to lien by project development lenders until project completion or fulfillment of our existing installment payment commitment. In the unlikely event that this project is not completed, the opening may be delayed and we may potentially be subject to future losses or capital commitments in order to complete construction or to monetize our previous investments in the land.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Second Paragraph\nMention your qualifications, skills and experience, and relate them to the needs of the company. Give relevant examples of how you have used your skills in the past to perform similar tasks and responsibilities to those set out in the job description.", - "page_start": 46, - "page_end": 46, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Investment Properties Under Construction\nManagement believes that building and buying new apartments has the opportunity to generate more stable cash flows and improved returns on investments over time compared to buying older buildings. Management acknowledges that there was a dilutive impact on FFO per share growth during the period of construction but believes the short-term impact is more than offset by the 10-15 years of nominal maintenance costs provided by a newly built project. Older buildings typically require a much higher capital spend per year, estimated at least $1,200 per unit per year, versus an estimated $300 per unit for new construction. Assuming similar NOI growth between an old and new building, the lower capital spend on the new build is expected to result in a higher return on the total investment in the property in the first 10 - 15 years of ownership. Management expects to provide disclosure regarding capital spend associated with its new development projects over the next few years to provide support for this theory and show the Company's ability to grow the return on investments of the new developments over time.\nKillam ProPerties inc | 2013 49", - "page_start": 48, - "page_end": 48, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "24. -(1) A person who is-\n33. -(1) Any of the following-\n(a) a person ('P') who-\n(i) before travelling to the United Kingdom has made arrangements with a provider in the United Kingdom to receive healthcare (or, where P is a child, on whose behalf such arrangements have been made),\n(ii) is in possession of written confirmation of the arrangements from the provider,\n(iii) has travelled to the United Kingdom to receive that healthcare, and\n(iv) is attending a place to receive that healthcare or is travelling directly between that place and the place where they are self-isolating;\n(b) a person who-\n(i) is accompanying P for the purpose of providing necessary care or support to P in the circumstances referred to in sub-paragraph (1)(a)(iv), or\n(ii) is travelling, for the purpose of so accompanying P, directly between the place where they are self-isolating and either of the places referred to in sub-paragraph (1)(a)(iv),\nwhere that person has travelled to the United Kingdom for that purpose and is in possession of the confirmation referred to in sub-paragraph (1)(a)(ii) or a copy of it;\n(c) an accompanying child who is accompanying P or, where P is a child, is accompanying a person referred to in sub-paragraph (1)(b);\n(d) a live donor who is attending a place for the purpose referred to in the definition of 'live donor' or is travelling directly between that place and the place where they are selfisolating.\n(2) For the purposes of this paragraph-\n(a) 'accompanying child', in relation to P, means a child who has arrived in England with P and for whom P has responsibility, or where P is a child, a child who has arrived in England with the person referred to in sub-paragraph (1)(b) and for whom that person has responsibility;\n(b) 'healthcare' means all forms of healthcare provided for individuals, whether relating to mental or physical health, including healthcare in connection with giving birth;\n(c) 'live donor' means a person who-", - "page_start": 43, - "page_end": 43, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "NSSI in adolescence\nEmotion-wise, a developmental trend toward an increased specificity of emotion-related maps of bodily sensations (Barca et al. 2023)-a proxy of interoceptive representations of emotions-has been reported from children aged 6years to adulthood (Hietanen et al. 2016). Pubertal changes encompass dramatic bodily and neuroendocrine system changes, comprising-but not reduced to-changes in the reproductive, adrenal, and growth axes (Cameron 2004). Thus, adolescents might face at least four sources of uncertainty: (i) the uncertainty due to physiological alterations related to bodily changes and to modification in hormonal levels leading to sexual maturity; (ii) the uncertainty in selfidentity (i.e. the structure of self-awareness) and personal identity (i.e, the narrative diachronic self) (Drummond 2021), which might be coupled with changes in body image and the development of gender identity; (iii) the uncertainty in affect regulation, with the emergence of new forms of affectivity as feelings of love and sexual attraction toward a partner; and (iv) uncertainty in the social context, with respect to their social status and role expectations in the adult society. Such high levels of uncertainty might lead to a poorly defined sense of self, with unclear boundaries and a sense of emptiness. In this context, pain becomes a possible way to recover a bodily sense of self, and self-injurious behavior might be instantiated as an attempt to reduce the rise in the levels of uncertainty in these (and potentially other) domains, toward the transition to adulthood (see Miller et al. 2020 for a closely related approach on addiction).", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "Assign access to additional users\n1. In IAM Identity Center, create a permission set that follows the best practice of applying leastprivilege permissions.\nFor instructions, see Create a permission set in the AWS IAM Identity Center User Guide .\n2. Assign users to a group, and then assign single sign-on access to the group.\nFor instructions, see Add groups in the AWS IAM Identity Center User Guide .", - "page_start": 15, - "page_end": 15, - "source_file": "serverless-core.pdf" - }, - { - "text": "OPERATIONS REVIEW\nbreakwater will be an over capping type, which interrupts the waves progress, but does not totally protect from wave penetration. These events are manageable and estimated as a once in 50 years possibility.\nThe breakwater core will be used as a construction causeway allowing land based equipment to perform the work. The greater part of the breakwater work involves winning the material as opposed to actual construction.", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "What was the indicator related to increasing Nissan's research and development activities in terms of publication of scientific articles in 2004?", - "target_page": 46, - "target_passage": "And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. ", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "Nissan\nNissan Annual Report 2004", - "page_start": 23, - "page_end": 23, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Investor Relations Website\nhttp://www.nissan-global.com/EN/IR/\nNissan Annual Report 2004 110\nThis annual report is printed on recycled paper.\nNissan Annual Report 2004\nc3", - "page_start": 111, - "page_end": 112, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "OUR WAY\nNissan Annual Report 2004", - "page_start": 19, - "page_end": 19, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Global Retail Sales\n(Units: 1000s)\n2,633\nNissan Annual Report 2004\n7\nPERFORMANCE\nPERFORMANCE\n8\nNissan Annual Report 2004", - "page_start": 8, - "page_end": 9, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "From the C Platform\nThe real importance of the Alliance lies in its potential. The two companies do not exist in separate worlds, but they do possess different cultures and strengths. Renault is strong in Europe, which is good for Nissan. Nissan is strong in Japan and North America, which is good for Renault. We can challenge each other, and in doing so, drive ourselves to greater heights.\nNissan Annual Report 2004\n31\nWHO WE ARE\nOUR WORK\n32\nNISSAN IS A WORLD-CLASS AUTOMOBILE MANUFACTURER. TO ENVISION, PLAN, BUILD AND DISTRIBUTE MILLIONS OF AUTOMOBILES TO THE WORLD REQUIRES A CLEAR DEFINITION OF ROLES AND PROCESSES. AT NISSAN, OUR BUSINESS DIVISIONS COMMUNICATE IDEAS ACROSS COUNTRIES, CULTURES AND FUNCTIONS TO DEVISE THE TRANSPARENT, EFFICIENT SOLUTIONS THAT CREATE SUCCESS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\nNissan Annual Report 2004\n33\nOUR WORK\nOUR WORK\n34\nPLANNING", - "page_start": 32, - "page_end": 35, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Retail Sales by Region\n(Units: 1000s)\n*Including Mexico\nand Canada\nNissan Annual Report 2004\n9\nPERFORMANCE\nPERFORMANCE\n10\nNissan Annual Report 2004", - "page_start": 10, - "page_end": 11, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Five-Year Share Performance\nNissan Annual Report 2004\n15\nPERFORMANCE\nWHO WE ARE\nNissan Annual Report 2004 16\nWHO WE ARE\nNISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS AND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS OPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT COMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL MACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE PRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR CUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\n17\nWHO WE ARE\nWHO WE ARE\n18", - "page_start": 16, - "page_end": 19, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Payout Policy\nNissan announced its NISSAN Value-Up three-year dividend policy, covering the period from fiscal 2005 to fiscal 2007, at the annual general meeting of shareholders on June 23, 2004. Nissan proposes a long-term dividend policy to provide more visibility and improve transparency into the ways in which Nissan rewards its shareholders. Nissan believes that a long-term dividend policy reduces uncertainty for investors who already own or are considering acquiring Nissan stock.", - "page_start": 16, - "page_end": 16, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Research and Development\nNissan's investment in R&D has been rising. In fiscal 2004 we devoted approximately ¥400 billion to it, equivalent to 4.6 percent of our turnover. We estimate that our financial commitment to R&D will continue to range between 4.5 and 5 percent. R&D investments take a lot of time to pay off, of course, so it's difficult to evaluate our evolution over the short term. Given our expanded output, however, I believe that we are headed in the right direction.\nFor example, the number of patents we have generated is growing quickly, exceeding 4,000 in fiscal 2003-more than twice the fiscal 1999 figure. And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. These are direct results of our commitment to research. We are also generating more new technologies related to safety and the environment, such as the Around View Monitor and the lane-keeping system.\nRear active steering\nNissan Annual Report 2004\nMITSUHIKO YAMASHITA Executive Vice President\nWe have succeeded in shortening our production pipeline, too, using a new vehicle development process called V3P that our engineers devised over the past three years. V3P, which stands for Value-up innovation of Product, Process, and Program, has helped us cut our development time almost in half, from 20 months to just 10.5 months. I believe this makes Nissan the world benchmark in development. That improvement is having a major effect on the flexibility and execution of R&D at Nissan, and will ultimately boost the company's profitability.\nThe number of new products we have brought to market over the past three years is equally significantmore than thirty new vehicles. That's an impressive engineering achievement, and the reason you are seeing so many new Nissan models on the road.\nOur R&D infrastructure, however, is still in need of expansion. We've therefore begun building new facilities at the Nissan Technical Center, NTC, and at the Nissan Advanced Technical Center, NATC, both of which are in Japan. These additions represent a major investment, and show Nissan's dedication to maintaining and enhancing its technological skills.", - "page_start": 45, - "page_end": 45, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "IR Activities\nUnder NISSAN Value-Up, the IR team's performance will be evaluated based on the price-earnings ratio (PER) and volatility relative to our major competitors. PER is used to measure how successfully the IR team manages market expectations about Nissan in order to maintain the Nissan share price close to an intrinsic value. The other measure, volatility, is used to measure the risk investors perceive when considering Nissan stock. If Nissan can successfully reduce volatility, the minimum return required by investors should decline. The IR team believes that a strengthening of disclosure activities is required to improve both measures. The team plans to disclose not only financial results but also more forward-looking information about Nissan fundamentals such as technology and product. Such forward-looking information helps investors to forecast future performance more precisely and reduces uncertainty about the future. As a consequence, Nissan will increase the number of investor conferences, events, and teleconferences during fiscal 2005.", - "page_start": 16, - "page_end": 16, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "What was Nissan's vehicle production in Mexico in 2003?", - "target_page": 72, - "target_passage": "308,322", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Nissan\nNissan Annual Report 2004", - "page_start": 23, - "page_end": 23, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nNissan Europe S.A.S., 1 = Trappes, France. Nissan Europe S.A.S., 2 = Management of European manufacturing and sales. Nissan Europe S.A.S., 3 = €1,626. Nissan Europe S.A.S., 4 = 100.00. Nissan International Finance (Netherlands) B.V., 1 = Amsterdam, The Netherlands. Nissan International Finance (Netherlands) B.V., 2 = Financing for group companies. Nissan International Finance (Netherlands) B.V., 3 = €13. Nissan International Finance (Netherlands) B.V., 4 = 100.00. Nissan France S.A., 1 = Trappes, France. Nissan France S.A., 2 = Sales of automobiles and parts. Nissan France S.A., 3 = €4. Nissan France S.A., 4 = 94.77. Nissan Motor (GB) Ltd., 1 = Rickmansworth, UK. Nissan Motor (GB) Ltd., 2 = Sales of automobiles and parts. Nissan Motor (GB) Ltd., 3 = £136. Nissan Motor (GB) Ltd., 4 = 100.00. Nissan Holding (UK) Ltd., 1 = Sunderland, UK. Nissan Holding (UK) Ltd., 2 = Holding company for English subsidiaries. Nissan Holding (UK) Ltd., 3 = €870. Nissan Holding (UK) Ltd., 4 = 100.00. Nissan Italia S.p.A., 1 = Rome, Italy. Nissan Italia S.p.A., 2 = Sales of automobiles and parts. Nissan Italia S.p.A., 3 = €5. Nissan Italia S.p.A., 4 = 100.00. Nissan Motor Manufacturing (UK) Ltd., 1 = Sunderland, UK. Nissan Motor Manufacturing (UK) Ltd., 2 = Manufacture and sales of automobiles and parts. Nissan Motor Manufacturing (UK) Ltd., 3 = £250. Nissan Motor Manufacturing (UK) Ltd., 4 = 100.00. Nissan Technical Center Europe Ltd., 1 = Granfield, UK. Nissan Technical Center Europe Ltd., 2 = Research and development, testing. Nissan Technical Center Europe Ltd., 3 = £15. Nissan Technical Center", - "page_start": 108, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nshare*(%) = 100.00. Canada, Location = . Canada, Principal business = . Canada, As of Mar. 31, 2005.Capital (millions) = . Canada, As of Mar. 31, 2005.Nissan share*(%) = . Nissan Canada, Inc., Location = Mississauga, Ontario. Nissan Canada, Inc., Principal business = Sales of automobiles and parts. Nissan Canada, Inc., As of Mar. 31, 2005.Capital (millions) = CAN$68. Nissan Canada, Inc., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Mexico, Location = . Mexico, Principal business = . Mexico, As of Mar. 31, 2005.Capital (millions) = . Mexico, As of Mar. 31, 2005.Nissan share*(%) = . Nissan Mexicana, S.A. de C.V., Location = Mexico D.F.. Nissan Mexicana, S.A. de C.V., Principal business = Manufacture and sales of automobiles and parts. Nissan Mexicana, S.A. de C.V., As of Mar. 31, 2005.Capital (millions) = P17,056. Nissan Mexicana, S.A. de C.V., As of Mar. 31, 2005.Nissan share*(%) = 100.00\nNissan Annual Report 2004\nEurope", - "page_start": 107, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Five-Year Share Performance\nNissan Annual Report 2004\n15\nPERFORMANCE\nWHO WE ARE\nNissan Annual Report 2004 16\nWHO WE ARE\nNISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS AND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS OPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT COMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL MACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE PRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR CUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\n17\nWHO WE ARE\nWHO WE ARE\n18", - "page_start": 16, - "page_end": 19, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nEurope Ltd., 4 = 100.00. Nissan Forklift Europe B.V., 1 = Amsterdam, The Netherlands. Nissan Forklift Europe B.V., 2 = Sales of forklifts and parts. Nissan Forklift Europe B.V., 3 = €6. Nissan Forklift Europe B.V., 4 = 100.00. Nissan Motor Iberica, S.A., 1 = Barcelona, Spain. Nissan Motor Iberica, S.A., 2 = Manufacture and sales of automobiles and parts. Nissan Motor Iberica, S.A., 3 = €725. Nissan Motor Iberica, S.A., 4 = 99.76. Nissan Motor Espana, S.A., 1 = Barcelona, Spain. Nissan Motor Espana, S.A., 2 = Sales of automobiles and parts. Nissan Motor Espana, S.A., 3 = €12. Nissan Motor Espana, S.A., 4 = 100.00. Nissan Forklift Espana, S.A., 1 = Noain, Spain. Nissan Forklift Espana, S.A., 2 = Manufacture and sales of forklifts and parts. Nissan Forklift Espana, S.A., 3 = €9. Nissan Forklift Espana, S.A., 4 = 100.00. Australia, 1 = . Australia, 2 = . Australia, 3 = . Australia, 4 = . Nissan Motor Co. (Australia) Pty. Ltd., 1 = Dandenong, Victoria. Nissan Motor Co. (Australia) Pty. Ltd., 2 = Sales of automobiles and parts. Nissan Motor Co. (Australia) Pty. Ltd., 3 = A$290. Nissan Motor Co. (Australia) Pty. Ltd., 4 = 100.00. New Zealand, 1 = . New Zealand, 2 = . New Zealand, 3 = . New Zealand, 4 = . Nissan New Zealand Ltd., 1 = Auckland. Nissan New Zealand Ltd., 2 = Managing New Zealand subsidiaries; automobile sales. Nissan New Zealand Ltd., 3 = NZ$51. Nissan New Zealand Ltd., 4 = 100.00. South Africa, 1 = . South Africa, 2 = . South Africa, 3 = . South Africa, 4 = . Nissan Motor Company South Africa (Pty) Ltd., 1 = Rosslyn. Nissan Motor Company", - "page_start": 108, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Retail Sales by Region\n(Units: 1000s)\n*Including Mexico\nand Canada\nNissan Annual Report 2004\n9\nPERFORMANCE\nPERFORMANCE\n10\nNissan Annual Report 2004", - "page_start": 10, - "page_end": 11, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "From the C Platform\nThe real importance of the Alliance lies in its potential. The two companies do not exist in separate worlds, but they do possess different cultures and strengths. Renault is strong in Europe, which is good for Nissan. Nissan is strong in Japan and North America, which is good for Renault. We can challenge each other, and in doing so, drive ourselves to greater heights.\nNissan Annual Report 2004\n31\nWHO WE ARE\nOUR WORK\n32\nNISSAN IS A WORLD-CLASS AUTOMOBILE MANUFACTURER. TO ENVISION, PLAN, BUILD AND DISTRIBUTE MILLIONS OF AUTOMOBILES TO THE WORLD REQUIRES A CLEAR DEFINITION OF ROLES AND PROCESSES. AT NISSAN, OUR BUSINESS DIVISIONS COMMUNICATE IDEAS ACROSS COUNTRIES, CULTURES AND FUNCTIONS TO DEVISE THE TRANSPARENT, EFFICIENT SOLUTIONS THAT CREATE SUCCESS. THIS IS THE NISSAN SHIFT_\nNissan Annual Report 2004\nNissan Annual Report 2004\n33\nOUR WORK\nOUR WORK\n34\nPLANNING", - "page_start": 32, - "page_end": 35, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries\nshare*(%) = 100.00. Nissan Motor Acceptance Corporation, Location = Torrance California. Nissan Motor Acceptance Corporation, Principal business = Finance of wholesale and retail automobile sales in US. Nissan Motor Acceptance Corporation, As of Mar. 31, 2005.Capital (millions) = $499. Nissan Motor Acceptance Corporation, As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Motor Corporation in Hawaii, Ltd., Location = Honolulu, Hawaii. Nissan Motor Corporation in Hawaii, Ltd., Principal business = Sales of automobiles and parts. Nissan Motor Corporation in Hawaii, Ltd., As of Mar. 31, 2005.Capital (millions) = $6. Nissan Motor Corporation in Hawaii, Ltd., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Capital of America, Inc., Location = Torrance, California. Nissan Capital of America, Inc., Principal business = Financing for group companies. Nissan Capital of America, Inc., As of Mar. 31, 2005.Capital (millions) = $1. Nissan Capital of America, Inc., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Technical Center North America, Inc., Location = Farmington Hills Michigan. Nissan Technical Center North America, Inc., Principal business = Research and development, testing. Nissan Technical Center North America, Inc., As of Mar. 31, 2005.Capital (millions) = $16. Nissan Technical Center North America, Inc., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Motor Insurance Corporation, Location = Honolulu, Hawaii. Nissan Motor Insurance Corporation, Principal business = Casualty insurance. Nissan Motor Insurance Corporation, As of Mar. 31, 2005.Capital (millions) = $10. Nissan Motor Insurance Corporation, As of Mar. 31, 2005.Nissan share*(%) = 100.00. Nissan Forklift Co., North America, Location = Marengo, Illinois. Nissan Forklift Co., North America, Principal business = Manufacture and sales of forklifts and parts. Nissan Forklift Co., North America, As of Mar. 31, 2005.Capital (millions) = $34. Nissan Forklift Co., North America, As of Mar. 31, 2005.Nissan", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Making Profit as a Smaller Player\nDOMINIQUE THORMANN Senior Vice President Nissan Europe\n'Europe is one of the most fragmented automotive market in the world and a highly competitive one besides. Despite our relatively small size, however, we have begun to demonstrate that it is possible to make money in Europe. In fact, although Nissan does not yet deliver the levels of profitability here\nthat the U.S. or other markets generate, we surpassed our NISSAN 180 business targets in fiscal 2004. Our profitability is now on par with the best European manufacturers. Nissan has a foundation for increasing profitability further in the coming years in Europe.\nNissan is already an established name around the region, and the brand is strongly associated with 4x4 technology, off-road vehicles and pickup trucks. However, there is also a solid heritage built around the Micra, a model designed for urban driving. Both the first and second generations of this car were very successful, and the third generation is performing well. To leverage our 4x4 heritage and SUV strength into the passenger car segment, Nissan is developing a series of crossover vehicles that blend car-like performance with 4x4 versatility. The Qashqai concept vehicle introduced at the 2004 Geneva Motor Show is the first of these-smaller, more affordable, and better adapted to European roads. The Qashqai will go into production in our plant in Sunderland in the UK in early 2007. The Murano, launched this year, is a precursor to the Qashqai in the larger executive segment. Europeans have already taken to the Murano, driving sales far past our initial forecasts in all markets. This car is helping make Nissan a brand that people aspire to own.\nNissan is still a small player in the region, selling 550,000 cars across a very large and diverse territory that stretches from the Atlantic Ocean to Russia, and from Finland to Israel. In the past we covered the area through multiple distribution channels, which we are currently in the process of simplifying. A few aspects of the European market have made profitability more difficult to achieve. For example, automakers must provide models with much diversity: diesel and gasoline powertrains; manual and automatic transmissions. The cars must also be engineered to suit the high driving speeds typical in the region and ensure superior handling, which results in higher costs.", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "M MOTORSPORTS\nNissan Annual Report 2004\nMoottoorrssppoorrttss\nMotorsports is a dynamic form of marketing that offers a natural forum for presenting the Nissan brand. On the track, Nissan's technologies are pushed to the limit-and sometimes beyondunder grueling conditions.\nNissan participates in a wide range of motorsports, including the Super GT Series.\nand management. To increase service productivity and efficiency, we send former factory foremen and engineers to various service workshops to analyze service staff performance. This will help cut repair times and improve customer satisfaction. The Nissan Sales and Service Way is also a tool used to increase the quality of service provided by all dealers. Its successful implementation has enhanced customer satisfaction worldwide.\nThe conversion business in Japan looks very promising. We discovered that 50 percent of car owners want to customize their vehicles, and 28 percent already had. Such a high penetration rate illustrates how much people want a car that's different from everyone else's. The Rider seriescustomized versions of Nissan cars developed by our wholly owned subsidiary Autech-are very popular, especially among younger Japanese. The series exemplifies the major potential of the conversion business.\nGlobal Aftersales is a young division, but we've performed well from the start, meeting our global commitments every year during NISSAN 180 and contributing to the Company's growth. We have expanded nearly 20 percent year-on-year between 2001 and 2004, and intend to continue this momentum during NISSAN Value-Up. We will optimize our cost structure by sourcing parts from the leading competitive countries. We are striving to develop an even tighter relationship with our customers and to provide them with new services throughout the ownership cycle. I believe this broader range of aftersales services will provide sustainable growth in Nissan's revenues and profit.'\nThis is the most popular racing series in Japan, and is increasingly broadcast around the world. Motorsports will remain an important marketing outlet that enhances both Nissan's brand presence and our engineering capabilities.\nCOMMUNICATIONS", - "page_start": 43, - "page_end": 44, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "Why did Sundance Energy's oil sales improve in 2014?", - "target_page": 18, - "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Recent Events and a Better Way Forward\nThe good news, however, is that America can now secure a new energy future thanks to Chesapeake and a handful of other leading U.S. E&P companies that have reinvented the process of finding natural gas and oil during the past five years. In doing so, we have discovered twice the resources of natural gas in the U.S. that Saudi Arabia possesses in oil. Furthermore, these same few companies that led the unconventional natural gas revolution have in just the past two years also reinvented the way in which we can find large new oil resources onshore in the U.S. In fact, I believe the U.S. can possibly increase its production of oil from the current 5.8 million barrels per day by 30-50% during the next 5-10 years, thereby potentially reaching the President's 2025 goal of reducing foreign oil imports by 33%, 5-10 years earlier than hoped.\n2010 ANNUAL REPORT |\n15\nThe combination of these vast new discoveries of unconventional natural gas and liquids provides America with a unique future pathway toward greater energy independence, an industrial renaissance, economic rejuvenation and greater national security. I remain fully confident that the marketplace understands this and that over time the U.S. will more fully embrace and utilize clean, affordable, abundant American natural gas and increased domestic oil production as the best alternatives to burning environmentally challenged coal and expensive and dangerous foreign oil.\nThere is now a clear road ahead toward a more sustainable, affordable, dynamic and independent future if America embraces the remarkable gift of energy abundance that Chesapeake has helped discover in the U.S. You have my commitment, and the commitment of more than\nThe combination of these vast new discoveries of unconventional natural gas and liquids provides America with a unique future pathway toward greater energy independence, an industrial renaissance, economic rejuvenation and greater national security.\n10,000 other Chesapeake employees, that every day we are working hard to create shareholder value and a better future for our communities, our states and our country through the continued discovery and development of unconventional natural gas and liquids.\nBest regards,\nAubrey K. McClendon\nChairman and Chief Executive Officer April 15, 2011\n16\n| OPERATING AREAS", - "page_start": 16, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nI am pleased to present Sundance Energy Australia Limited's Annual Report for the 12 months ended 31 December 2014. It has been another year of significant progress for Sundance across our portfolio of liquids rich oil and gas assets in the US.\nThe Company's strategic focus on growing production, cash flows and reserves from large, repeatable resource plays in North America continues to deliver positive results with growth in production, cash flows, and reserves.\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston Basin in North Dakota for $51 million which realised an internal rate of return of 45 percent; and also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado for $114 million which realised an internal rate of return of 104 percent. These divestitures of smaller, less scalable positions enabled us to focus on developing and growing our assets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\nDespite the reduction in crude oil and liquids prices towards the end of the year and continuing into 2015, the operational performance and focused, value-adding transactions during the past year have positioned the Company very favourably for future growth in net asset value and shareholder returns.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "2. Principal Activities\nThe principal activities of the consolidated entity during the financial year were: petroleum exploration, the production, treatment and marketing of natural gas, crude oil, condensate, naphtha and liquid petroleum gas, and the transportation by pipeline of crude oil. No significant change in the nature of these activities has occurred during the year.", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Utility and Fuel Expense - Same Store\nFor the years ended December 31,\nnatural gas, 2013 = $4,565. natural gas, 2012 = $2,729. natural gas, % change = 67.3%. oil, 2013 = 1,523. oil, 2012 = 2,095. oil, % change = (27.3)%. electricity, 2013 = 5,197. electricity, 2012 = 4,671. electricity, % change = 11.3%. Water, 2013 = 3,582. Water, 2012 = 3,474. Water, % change = 3.1%. other, 2013 = 30. other, 2012 = 33. other, % change = (9.1)%. Total utility and fuel expenses, 2013 = $14,897. Total utility and fuel expenses, 2012 = $13,002. Total utility and fuel expenses, % change = 14.6%\nKillam's apartment properties are heated with a combination of natural gas (55%), electricity (36%), oil (8%) and other sources (1%).\nElectricity costs at the unit level are usually paid directly by tenants, reducing Killam's exposure to the majority of the 4,500 units heated with electricity. Fuel costs associated with natural gas or oil fired heating plants are paid by Killam. As such, the Company is exposed to fluctuations in natural gas and oil costs, which represent 40.9% of total same store utility and fuel costs in 2013. Killam invests in green initiatives at its properties to maximize efficiencies, including converting many of its Halifax properties to natural gas from oil over the last three years as natural gas infrastructure has been expanded in the city. The decision to convert was supported by the substantial price difference between the cost of natural gas and oil in recent years.\nAs noted in the table above, Killam's utility and fuel expenses increased 14.6% in 2013 compared to 2012. The increase was primarily attributable to higher natural gas, electricity costs and water costs.\nKillam's natural gas expenses increased by 67.3% in 2013 due to higher gas prices in Atlantic Canada and an increase in properties burning natural gas following conversions of certain Halifax heating plants from oil to gas in 2012 and 2013. The reduction in oil expense in the quarter and year-to-date reflects this reduction in oil exposure.", - "page_start": 37, - "page_end": 37, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "United States\nExploration\nProduction\nOil field\nGas field\nOil pipeline\nGas pipeline", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Recent Events and a Better Way Forward\nYou may be aware that I have been outspoken in attempting to persuade our country's political leadership to recognize that the discovery of vast resources of unconventional natural gas and oil in the U.S. is a complete game changer for our country from an economic, national security and environmental perspective. After two years of my best efforts and the efforts of many others in the industry, most notably T. Boone Pickens,\n2010 ANNUAL REPORT |\n13\nDeveloping great assets begins with great people, such as the hardworking crews of Nomac, Chesapeake's wholly owned drilling subsidiary. Employees take pride in the critical roles they play in finding and delivering natural gas to their fellow Americans.\nRig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.\nI am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable. There appears to be growing recognition that it is spectacularly dangerous for America to continue importing 9 million barrels of oil per day and exporting\nmore than $1 billion per day in national wealth to oil exporting countries.\nAmerica's undiminished appetite for foreign oil has created the largest wealth transfer in the history of the world. The political leadership in Washington, D.C., has not seemed overly concerned about this issue until recently. However, after President Obama's recent speech calling", - "page_start": 13, - "page_end": 15, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "APPLYING NEW TECHNOLOGIES\nReservoir studies have identified that some lower permeability reservoirs may have significant potential to increase recoveries through activities such as additional infill drilling, fracture stimulation and waterflooding.\nSantos tested new technologies in the Cooper Basin in drilling, completions and artificial lift optimisation during 2004 to improve product delivery and recovery in order to reduce production costs per unit.\nTo this end, further reductions in costs for 2005 are targeted by increasing the focus on fit for purpose rigs and larger campaigns. These efforts will be supported by a significant boost in 3D seismic acquisition that commenced at the end of 2003 and continues in 2005.\nCoiled tubing underbalanced drilling operations were performed at three gas wells and one oil well, while multiple pinpoint fracture stimulations were performed at five new gas wells, with between three and six fracs performed in each well.\nThese introductory programs are providing encouraging initial results. The underbalanced drilling\nprogram achieved better than predicted rate improvements for all three gas wells.\nThese programs will now be extended to a variety of more complex and possibly harsher oil and gas wellbore/reservoir environments during 2005.\nSantos increased gas well deliverability in the Cooper Basin by 63 TJ per day through numerous projects brought on line during 2004. Some 8 PJ of incremental gas production resulted during 2004 from this optimisation program. These results were achieved at a significantly lower cost than conventional development drilling and substantially exceeded targets set at the beginning of the year.\nWhile the Cooper Basin is a mature hydrocarbon area, Santos is drilling wells which can be commercialised quickly and cost-effectively, delivering strong cash flow which can be applied to other growth opportunities. A further focus in 2004 was to leverage Cooper Basin infrastructure; for example, via gas swaps, and increase prices under existing agreements.\nAn increased Gas Sales Agreement was reached with CS Energy which resulted in an additional seven wells being drilled at the Scotia coal seam methane gas field in eastern Queensland.\n'The response of our people to the Moomba incident and rebuild was truly outstanding. With this behind us, we are now focused on continuing to extract value from our legacy assets while preparing to bring our new growth projects, such as Mutineer-Exeter, Oyong and Casino, into production.'\nJON YOUNG\nExecutive Vice President Operations\nStewart Duncan, Environmental Adviser, and Melanie Brown, Lead Specialist Drilling Engineer, inspecting coiled tubing underbalanced drilling operations, Cooper Basin, central Australia.\nAnnual Report 2004\n13\n14", - "page_start": 13, - "page_end": 15, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Positive outlook for 2015\nDespite the current oil pricing scenario, Sundance's medium-to-long term growth trajectory looks very positive.\nWe can demonstrate this through:\n· A track record of capital efficient growth\n· A track record of value creation\n· Being a low cost/high margin operator\n· Having top tier Eagle Ford assets with an extensive drilling inventory\n· Having a clean balance sheet\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, and with the increasing interest and support from institutional and retail investors. I believe that Sundance will deliver significant long-term value from our assets for our shareholders.", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "AMERICA'S PREMIER ENERGY RESOURCE BASE »\nChesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has built a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica unconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise gained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of natural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of divestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays.\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion cubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end 2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the U.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities - almost 50 years worth of drilling opportunities - on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake's ownership position in our key operating areas.\nUnconcerned by a Chesapeake drilling rig, antelope continue their daily routines in southeastern Wyoming's Powder River Basin where the company is developing the promising Niobrara Play.\n17\n| OPERATING AREAS", - "page_start": 17, - "page_end": 19, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "IT'S LOGICAL\nMermaid Marine Australia Limited's future is now inextricably linked to the oil and gas industry. Oil continues to be the main attraction to explorers because of its lower infrastructure costs, early cash flow and easier marketing, but it is gas, which is emerging as the premier fuel.\nGas is clean, portable, in massive supply and the environmental answer to so many of today's atmospheric problems. Together with its sister product, condensate it is also the dominant feedstock for the petrochemical industry. In Australia . . . gas has a very, very great future .\nFrom all sources, our country consumes or exports a modest total of approximately one trillion cubic feet of gas each year. Gas is found in a number of places around Australia, but over 90% of national reserves are found offshore of northwestern Australia, where current estimates of gas in place comfortably exceed 100 trillion cubic feet .\nThese reserves were effectively found as a co-product in the search for oil, yet on today's economics, only one trillion cubic feet of gas with the appropriate production infrastructure in place is estimated to be worth $A5 billion dollars .\nTherefore it may be simplistic, but true, that the undiscounted value of the gas in Australia's northwest, is so far worth a staggering $500 billion dollars and rising .\nDespite these mind bending numbers, existing production taps far less than half of 1% of this huge resource each year, a resource which increases almost by accident, from exceedingly modest levels of exploration for oil.\nWe at Mermaid recognise that these are solid and compelling reasons to focus our attention unwaveringly on this industry, within this region. To build the company's seagoing assets and strategically blessed shore bases at Dampier, Broome and Darwin with all speed. To lift our professional expertise and productive capability to meet what we have assessed to be an amazing and highly exclusive opportunity.\n4", - "page_start": 4, - "page_end": 7, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "I heard that Sundance Energy has acquired land in South Texas in July 2014, where is it?", - "target_page": 21, - "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "2013 Acquisitions - Investment Properties\n1,810. , Location = . , Acquisition Date = . , Year Built = . , Units = . , Purchase Price (2) = $6,910. Total Acquisitions, Location = . Total Acquisitions, Acquisition Date = . Total Acquisitions, Year Built = . Total Acquisitions, Units = . Total Acquisitions, Purchase Price (2) = $121,066\n(1) Acquired as a portfolio.\n(2) Purchase price on acquisition does not include transaction-related costs.\n(3) Killam entered into a 50/50 joint development agreement with another company for the purchase of this land. The $1.8 million purchase price represents\nKillam's interest in the land.\n(4) Included in the acquisition is 21,242 square feet of commercial space.\nIn addition to apartment acquisitions during 2013, Killam purchased a MHC in Antigonish with 65 sites and three parcels of land for future development. The parcel of land located in Cambridge is 5.2 acres and is zoned for a maximum height of seven stories and a density of 180 units. The parcel of land in Moncton is 0.8 acres and the land located at 1057 Barrington Street in Halifax is 0.7 acres and was purchased under a joint development agreement for the purpose of developing a six-story mixed-use building.\n48\nKillam ProPerties inc | 2013", - "page_start": 47, - "page_end": 47, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Interest in Shares :\n1,059,000 ordinary shares in Sundance Energy Australia Limited", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Interest in Shares :\n596,700 Ordinary Shares in Sundance Energy Australia Limited", - "page_start": 26, - "page_end": 26, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Dear Fellow Shareholders,\n2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 21.6%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -48.0%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 1.1%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 63.3%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 29.9%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 15.1%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = -15.6%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 87.8%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 14.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 59.7%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -44.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = -14.5%\n~$50 million in current period gains while freeing up ~$165 million in invested capital.\nWe primarily reinvested this capital in production growth and cash flow with only about $75 million reinvested in acquiring oil and gas leases and producing properties. This resulted in our production increasing from 5,028 BOEPD to 9,434 BOEPD by December 2014 and full year EBITDAX increasing $73.8 million to $126.4 million in 2014. Had prices stayed steady, we likely would have generated earnings before income taxes of over $85 million and a return on capital in excess of 20%.", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Acquisitions\nIn April 2014, the Company acquired approximately 4,800 net acres in the Eagle Ford for an initial purchase price of approximately $10.5 million and two separate earn out payments due upon commencement of drilling in each of three blocks of acreage (total for all three blocks of $7.7 million) and payout of the first two wells drilled on each block of the acreage ($7.7 million). The term of the agreement is two years and provides a one year extension for $500 per acre extended. This acquired acreage is adjacent to our existing acreage in McMullen County, Texas.\nIn July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas, for approximately $36 million and a commitment to drill four Eagle Ford wells. The Company also has the option, at its sole discretion, to acquire the Seller's remaining working interest for an additional $45 million for the earlier of one year from closing the acquisition or six months from first production of hydrocarbons.\n- 19 -", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "NOTE 4: LAND, PROPERTY AND EQUIPMENT\nLand, property and equipment consist of the following:\nLand and land improvements, January 31, 2015 = $99. Land and land improvements, February 1, 2014 = $80. Buildings and building improvements, January 31, 2015 = 1,040. Buildings and building improvements, February 1, 2014 = 991. Leasehold improvements, January 31, 2015 = 2,510. Leasehold improvements, February 1, 2014 = 2,330. Store fixtures and equipment, January 31, 2015 = 3,055. Store fixtures and equipment, February 1, 2014 = 2,894. Capitalized software, January 31, 2015 = 739. Capitalized software, February 1, 2014 = 628. Construction in progress, January 31, 2015 = 595. Construction in progress, February 1, 2014 = 421. Land, property and equipment, January 31, 2015 = 8,038. Land, property and equipment, February 1, 2014 = 7,344. Less: accumulated depreciation and amortization, January 31, 2015 = (4,698). Less: accumulated depreciation and amortization, February 1, 2014 = (4,395). Land, property and equipment, net, January 31, 2015 = $3,340. Land, property and equipment, net, February 1, 2014 = $2,949\nThe total cost of property and equipment held under capital lease obligations was $28 at the end of both 2014 and 2013, with related accumulated amortization of $26 in 2014 and $25 in 2013. Depreciation expense was $498 in 2014, $444 in 2013 and $410 in 2012.\nNordstrom, Inc. and subsidiaries 49", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Competent Persons Statement\nThis report contains information on Sundance Energy's reserves and resources which has been reviewed by David Ramsden-Wood, Professional Engineer, who is licensed in Alberta, Canada and is qualified in accordance with ASX Listing Rule 5.11 and has consented to the inclusion of this information in the form and context in which it appears.\nDESIGN BY:\nMark Mulvany Graphic Design (Denver, CO)\nPHOTOGRAPHY BY:\nMichael McConnell Photography (Denver, CO)\nwww.sundanceenergy.net\nwww.sundanceenergy.com.au", - "page_start": 112, - "page_end": 113, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Sundance Energy Australia Limited\nABN 76 112 202 883", - "page_start": 112, - "page_end": 112, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Capitalized LandÑll Costs\nCapitalized landÑll costs include expenditures for land, permitting costs, cell construction costs and environmental structures. Capitalized permitting and cell construction costs are limited to direct costs relating to these activities, including legal, engineering and construction costs associated with excavation, natural and synthetic liners, construction of leachate collection systems, installation of methane gas collection and monitoring systems, installation of groundwater monitoring wells, and other costs associated with the development of the site. Interest is capitalized on landÑll construction projects while the assets are undergoing activities to ready them for their intended use. Capitalized landÑll costs also include Ñnal capping, closure and post-closure assets accrued in accordance with SFAS 143 as discussed below.\nCosts related to acquiring land, excluding the estimated residual value of unpermitted, non-buÅer land, and costs related to permitting and cell construction are depleted as airspace is consumed using the units-ofconsumption method.\nCapitalized landÑll costs may also include an allocation of purchase price paid for landÑlls. For landÑlls purchased as part of a group of several assets, the purchase price assigned to the landÑll is determined based upon the discounted expected future cash Öows of the landÑll relative to the other assets within the acquired group. If the landÑll meets the Company's expansion criteria, the purchase price is further allocated between permitted airspace and expansion airspace based upon the ratio of permitted versus probable expansion airspace to total available airspace. LandÑll purchase price is amortized using the units-of-consumption method over the total available airspace including probable expansion airspace where appropriate.", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Dear Fellow Shareholders,\nI am pleased to present Sundance Energy Australia Limited's Annual Report for the 12 months ended 31 December 2014. It has been another year of significant progress for Sundance across our portfolio of liquids rich oil and gas assets in the US.\nThe Company's strategic focus on growing production, cash flows and reserves from large, repeatable resource plays in North America continues to deliver positive results with growth in production, cash flows, and reserves.\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston Basin in North Dakota for $51 million which realised an internal rate of return of 45 percent; and also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado for $114 million which realised an internal rate of return of 104 percent. These divestitures of smaller, less scalable positions enabled us to focus on developing and growing our assets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\nDespite the reduction in crude oil and liquids prices towards the end of the year and continuing into 2015, the operational performance and focused, value-adding transactions during the past year have positioned the Company very favourably for future growth in net asset value and shareholder returns.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "I am the CFO of Sundance Energy, will my base increase in 2015 as it did in 2014?", - "target_page": 31, - "target_passage": "No increases to Managing Director’s or KMP’s base salary", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Dear Fellow Shareholders,\nI am pleased to present Sundance Energy Australia Limited's Annual Report for the 12 months ended 31 December 2014. It has been another year of significant progress for Sundance across our portfolio of liquids rich oil and gas assets in the US.\nThe Company's strategic focus on growing production, cash flows and reserves from large, repeatable resource plays in North America continues to deliver positive results with growth in production, cash flows, and reserves.\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston Basin in North Dakota for $51 million which realised an internal rate of return of 45 percent; and also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado for $114 million which realised an internal rate of return of 104 percent. These divestitures of smaller, less scalable positions enabled us to focus on developing and growing our assets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\nDespite the reduction in crude oil and liquids prices towards the end of the year and continuing into 2015, the operational performance and focused, value-adding transactions during the past year have positioned the Company very favourably for future growth in net asset value and shareholder returns.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Base Salary\n- 33 -", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Stock Ownership Guidelines\nOwnership of our stock by our executives aligns their interests with the interests of our shareholders. Accordingly, the Board of Directors maintains stock ownership guidelines for certain key executive officers. The applicable level of ownership is required to be achieved within five years of the later of the date these guidelines were adopted or the date the person first became an executive officer and is based on the executive's salary at the time these guidelines were adopted or date person first became subject to guidelines. The net shares acquired through incentive compensation plans (through the exercise of stock options, or the vesting of RSUs or performance shares) must be retained if the executive has not satisfied his or her targeted ownership. An executive's failure to meet the stock ownership guidelines may influence an executive's future mix of cash and non-cash compensation awarded by the Committee. Executives are not permitted to pledge their shares or invest in derivatives involving Company shares. Ownership is reviewed at least annually when compensation decisions are made.\nManaging Director and Chief Executive Officer, Share Ownership as Multiple of Base Pay = Five times annual base salary. Remaining Executive Officers, Share Ownership as Multiple of Base Pay = Two and a half times annual base salary\nThe following table shows share ownership as a multiple of base pay as at 31 December 2014, based on the Company's weighted average closing stock pricing of $0.95, calculated at the weighted average closing stock price translated into USD by multiplying by a weighted average FX rate (per the Reserve Bank of Australia), during the 2014 fiscal year.\n, Title = MD/CEO. , Base Salary at Commencement Date = $275,000. , Shares Owned as at 31 December 2014 = 1,908,581. , Estimated Value of Share Ownership = $1,813,152 6.6. , Times Base Salary = E. McCrady. CFO, Title = $225,000. CFO, Base Salary at Commencement Date = . CFO, Shares Owned as at 31 December 2014 = 275,370. CFO, Estimated Value of Share Ownership = $261,601 1.2. CFO, Times Base Salary = C. Anderson. VP of Exploration, Title = $230,000. VP of Exploration, Base Salary at Commencement Date = . VP of Exploration, Shares Owned as at 31 December 2014 = 376,403. VP of Exploration, Estimated Value of Share Ownership = $357,583 1.6. VP of Exploration, Times Base Salary = G. Ford", - "page_start": 33, - "page_end": 33, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Thank you for your support\nWe have had a busy year at Sundance and I would like to recognise the efforts and valued contribution of the Board of Directors, management team and all staff and contractors of the Company in helping us achieve our strategic goals. I am confident that we have the right team and excellent assets in place to execute our clear and focused strategy that we expect to deliver significant value for our shareholders.\nOn behalf of the Board and Company, I would like to thank our shareholders for your strong support of the Company throughout the year. We are committed to delivering long-term value for our shareholders and I look forward to reporting over the rest of the coming year on the continued value creation and growth of Sundance.\nYours sincerely,\nMIKE HANNELL\nChairman\nThe Company has a strong balance sheet to withstand the current low oil price environment, and our sound financial management strategy has seen the Company well supported by both new and existing investors in Australia and internationally.\n3\nCEO'S REPORT\n4", - "page_start": 4, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Dear Fellow Shareholders,\n2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 21.6%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -48.0%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 1.1%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 63.3%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 29.9%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 15.1%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = -15.6%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 87.8%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 14.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 59.7%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -44.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = -14.5%\n~$50 million in current period gains while freeing up ~$165 million in invested capital.\nWe primarily reinvested this capital in production growth and cash flow with only about $75 million reinvested in acquiring oil and gas leases and producing properties. This resulted in our production increasing from 5,028 BOEPD to 9,434 BOEPD by December 2014 and full year EBITDAX increasing $73.8 million to $126.4 million in 2014. Had prices stayed steady, we likely would have generated earnings before income taxes of over $85 million and a return on capital in excess of 20%.", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Base Salary\nBase salaries for executives recognize their qualifications, experience and responsibilities as well as their unique value and historical contributions to Sundance. In addition to being important to attracting and retaining executives, setting base salaries at appropriate levels motivates employees to aspire to and accept enlarged opportunities. We do not consider base salaries to be part of performance-based remuneration. In setting the amount, the individuals' performance is considered as well as the length of time in their current position without a salary increase.\n2013 Base Salaries and 2014 Salary Adjustments", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Forward Strategy\nTo implement this strategy, we will continue to drive down development costs by capitalizing on weak service demand and improving efficiency to create a sustainable cost advantage, leasing expired mineral rights in our core areas relinquished by peers with weaker balance sheets, and striving to acquire additional Eagle Ford assets with current production within our current, conservative balance sheet parameters. By creating a sustainable cost advantage and growing drilling inventory while prices are low, we anticipate generating strong shareholder returns through this cycle.\nFinally, our Company remains well positioned because of the hard and creative work put forth by our employees, board of directors, partners, contractors, and consultants. With prices low we have a new set of circumstances we can capitalize on to strengthen our business. Thanks to each and every one of you for your continued focus and passion to take the calculated risks needed for generating superior shareholder returns and building a stable, flourishing enterprise.\nSincerely,\nERIC MCCRADY\nManaging Director & CEO\nOur shareholders will benefit from our exposure to some of the highest quality US shale acreage and production in the Eagle Ford along with our leading cost structure and strong balance sheet.\n5\nFINANCIAL OVERVIEW\nThrough our emphasis on operating and G&A cost control initiatives, the Company's record oil and natural gas sales translated to best-in-class Adjusted EBITDAX Margin (79 percent) among peers our size and a full 10 absolute percentage points higher than the average of our entire peer group.\nAs a result of its significant production increase, the Company's 2014 oil, NGL and natural gas sales revenue increased by $74.4 million to $159.8 million; an 87 percent increase compared to $85.3 million in 2013.\nREVENUE (US$000s) AND PRODUCTION (Boe/d)\nThis topline growth resulted in Adjusted EBIDTAX increase of $73.8 million to $126.4 million (79 percent of revenue); a 140 percent increase compared to $52.6 million (62 percent of revenue) in 2013. In other words, for every $1.00 of revenue growth compared to 2013, the Company added $0.99 of 2014 Adjusted EBITDAX growth.", - "page_start": 6, - "page_end": 7, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Review of Operations\nProduction taxes. Our production taxes increased by $0.7 million (11.2%) to $7.0 million for the year ended 31 December 2014 from $6.3 million for the prior year but as a percent of revenue decreased 290 basis points to 4.4% from 7.3%. The decrease in production taxes as a percent of revenue is the result of exiting North Dakota and Colorado, both higher production tax rate jurisdictions, and increasing our investment in Texas and Oklahoma, which are lower production tax rate jurisdictions, as well as an adjustment for lower than anticipated ad valorem taxes.\nDepreciation and amortisation expense, including depletion. Our depreciation and amortisation expense increased by $49.4 million (136.3%) to $85.6 million for the year ended 31 December 2014 from $36.2 million for the prior year and increased $4.58 per Boe to $38.15 per Boe from $33.57 per Boe. The increase reflects our increase in production (107.9%), an increase in our asset base subject to amortisation as a result of our acquisition and development activity, and increased completion costs caused by high-demand for completion services and a shortage of trucks able to transport frac sand and resultant higher trucking rates.\nGeneral and administrative expenses. General and administrative expenses per Boe decreased by 51.2% to $6.92 for the year ended 31 December 2014 as compared to $14.18 per Boe for the prior year. The decrease in general and administrative expenses per Boe is driven by increased production levels diluting fixed general and administrative costs.\nImpairment expense. The Company recorded impairment expense of $71.2 million for the year ended 31 December 2014 on the Company's development and production assets that are located in Greater Anadarko and the Eagle Ford as the recoverable amount was less than the carrying value primarily as a result of lower commodity pricing. No impairment was necessary on the Company's exploration and evaluation assets. See Note 17 of the Notes to the Consolidated Financial Statements for further discussion.\nExploration expense. The Company incurred exploration expense of $10.9 million for the year ended 31 December 2014 on three unsuccessful exploratory wells in the Anadarko Basin. The Company did not drill any unsuccessful exploratory wells in the prior year.\n- 17 -", - "page_start": 18, - "page_end": 18, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Growing the Cash Flow from our Properties\nWe expect to generate, on average, between 2% and 4% in net operating income (NOI) growth through our same store portfolio on an annual basis. Our same store portfolio represents properties we have owned for equivalent periods year-over-year. Due to commodity price volatility, we experienced an unexpected spike in natural gas prices in Nova Scotia and New Brunswick throughout the 2013 heating season that increased same store utility and fuel expenses by 14%. We were able to partially o/ffset this unprecedented increase by managing controllable expenses to a modest 0.3% increase in the year; however, overall same store operating costs grew by 5.0%. These higher expenses more than o/ffset a 1.8% growth in revenue, resulting in a disappointing 0.4% decline in same store NOI for the year.\nWe are targeting positive same store growth in 2014 of up to 2%. Year-over-year occupancy improvements and increased rental rates are expected to generate revenue growth. Increasing our leasing sta/ff and re/fining our marketing and leasing process is proving e/ffective, resulting in improved occupancy levels in many of our core markets, especially in Ontario and New Brunswick. A colder than normal winter this year (2014) is translating into increased energy consumption and continued volatility in natural gas prices in Atlantic Canada, expected to result in higher than normal heating costs. We continue to invest in energy and operational e/fficiencies which we expect will keep our controllable costs down throughout the year and partially o/ffset higher heating costs.\nKillam ProPerties inc | 2013 9\nLooking beyond 2014, we expect to generate NOI growth more in the 2% to 4% range as large economic projects in\nAtlantic Canada are predicted to lead economic and population growth in the region. As the dominant residential landlord in Atlantic Canada with a wide variety of buildings and price points, we expect to bene/fit from this growth through increased demand for apartments.", - "page_start": 8, - "page_end": 9, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "A strong financial position\nSundance is well placed for future growth in the Eagle Ford. The Company has a strong balance sheet to withstand the current low oil price environment, and our sound financial management strategy has seen the Company well supported by both new and existing investors in Australia and internationally.\nWe expect that Sundance will grow organically and also through further leasing or bolt-on acquisitions in our core Eagle Ford focus area within our current, conservative balance sheet parameters.", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "What are the physical requirements for installing the Storwize V7000?", - "target_page": 70, - "target_passage": "You must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics: \u0002 Meets power, cooling, and location requirements of the Storwize V7000 nodes. \u0002 Has two separate power sources. \u0002 Sufficient rack space exists for the installation of controller and disk expansion enclosures. \u0002 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3.4 Physical planning\nYou must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics:\n/SM590000 Meets power, cooling, and location requirements of the Storwize V7000 nodes.\n/SM590000 Has two separate power sources.\n/SM590000 Sufficient rack space exists for the installation of controller and disk expansion enclosures.\n/SM590000 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website.\nYour Storwize V7000 2076-524 and Storwize V7000 2076-624 order includes a printed copy of the IBM Storwize V7000 Gen2 and Gen2+ Quick Installation Guide, which also provides information about environmental and power requirements.", - "page_start": 69, - "page_end": 69, - "source_file": "sg247938.pdf" - }, - { - "text": "3.3 Connectivity planning\nTable 3-1 Storwize V7000 communication options\nFibre Channel (FC) SAN, Host to Storwize V7000 = Yes. Fibre Channel (FC) SAN, Storwize V7000 to storage = Yes. Fibre Channel (FC) SAN, Storwize V7000 to Storwize V7000 = Yes. iSCSI (1 GbE or 10 GbE), Host to Storwize V7000 = Yes. iSCSI (1 GbE or 10 GbE), Storwize V7000 to storage = Yes. iSCSI (1 GbE or 10 GbE), Storwize V7000 to Storwize V7000 = No. iSCSI (25 GbE) (RDMA iSER), Host to Storwize V7000 = Yes. iSCSI (25 GbE) (RDMA iSER), Storwize V7000 to storage = No. iSCSI (25 GbE) (RDMA iSER), Storwize V7000 to Storwize V7000 = Yes. FCoE (10 GbE), Host to Storwize V7000 = Yes. FCoE (10 GbE), Storwize V7000 to storage = Yes. FCoE (10 GbE), Storwize V7000 to Storwize V7000 = Yes", - "page_start": 68, - "page_end": 68, - "source_file": "sg247938.pdf" - }, - { - "text": "3.1 General planning rules\nImportant: At the time of this writing, the statements that are provided in this book are accurate but can change. Always verify any statements that are made in this book with the IBM Storwize V7000 supported hardware list, device driver, firmware, and recommended software levels information that are available at the following websites:\n/SM590000 Support Information for Storwize V7000\n/SM590000 IBM System Storage Interoperation Center (SSIC)\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning must include several important steps. These steps ensure that the Storwize V7000 provides the best possible performance, reliability, and ease of management for your application needs. The correct configuration also helps minimize downtime by avoiding changes to the Storwize V7000 and the storage area network (SAN) environment to meet future growth needs.\nThis book is not intended to provide in-depth information about the described topics. For an enhanced analysis of advanced topics, see IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and Performance Guidelines , SG24-7521.", - "page_start": 65, - "page_end": 65, - "source_file": "sg247938.pdf" - }, - { - "text": "3.19.2 Back-end storage subsystems\nWhen connecting a back-end storage subsystem to IBM Storwize V7000, follow these guidelines:\n/SM590000 Connect all storage ports to the switch up to a maximum of 16, and zone them to all of the Storwize V7000 ports.\n/SM590000 Zone all ports on the disk back-end storage to all ports on the Storwize V7000 nodes in a clustered system.\n/SM590000 Ensure that you configure the storage subsystem LUN-masking settings to map all LUNs that are used by the Storwize V7000 to all the Storwize V7000 WWPNs in the clustered system.\nThe Storwize V7000 is designed to handle many paths to the back-end storage.\nIn most cases, the Storwize V7000 can improve performance, especially of mid-sized to low-end disk subsystems, older disk subsystems with slow controllers, or uncached disk systems, for the following reasons:\n/SM590000 The Storwize V7000 can stripe across disk arrays, and it can stripe across the entire set of configured physical disk resources.\n/SM590000 The Storwize V7000 control enclosure 2076-524 has 32 GB of cache and 2076-624 has 32 GB of cache (upgradeable to 64 GB).\n/SM590000 The Storwize V7000 can provide automated performance optimization of hot spots by using flash drives and Easy Tier.\nThe Storwize V7000 large cache and advanced cache management algorithms also allow it to improve the performance of many types of underlying disk technologies. The Storwize V7000 capability to asynchronously manage destaging operations that are incurred by writes while maintaining full data integrity can be important in achieving good database performance.\nBecause hits to the cache can occur in the upper (Storwize V7000) and the lower (back-end storage disk controller) level of the overall system, the system as a whole can use the larger amount of cache wherever it is located. Therefore, Storwize V7000 cache also provides more performance benefits for back-end storage systems with extensive cache banks.", - "page_start": 102, - "page_end": 102, - "source_file": "sg247938.pdf" - }, - { - "text": "Intercluster link\nTable 3-5 Intersystem heartbeat traffic in Mbps\n5, Storwize V7000 System 2.2 nodes = 06. 5, Storwize V7000 System 2.4 nodes = 06. 5, Storwize V7000 System 2.6 nodes = 06. 5, Storwize V7000 System 2.8 nodes = 2 nodes. 6, Storwize V7000 System 2.2 nodes = 10. 6, Storwize V7000 System 2.4 nodes = 11. 6, Storwize V7000 System 2.6 nodes = 12. 6, Storwize V7000 System 2.8 nodes = 4 nodes. 6, Storwize V7000 System 2.2 nodes = 11. 6, Storwize V7000 System 2.4 nodes = 16. 6, Storwize V7000 System 2.6 nodes = 17. 6, Storwize V7000 System 2.8 nodes = 6 nodes. 6, Storwize V7000 System 2.2 nodes = 12. 6, Storwize V7000 System 2.4 nodes = 17. 6, Storwize V7000 System 2.6 nodes = 21. 6, Storwize V7000 System 2.8 nodes = 8 nodes", - "page_start": 98, - "page_end": 98, - "source_file": "sg247938.pdf" - }, - { - "text": "3.19.3 Storwize V7000\nThe Storwize V7000 clustered system is scalable up to eight nodes. Its performance grows nearly linearly when more nodes are added until it becomes limited by other components in the storage infrastructure. Although virtualization with the Storwize V7000 provides a great deal of flexibility, it does not abolish the necessity to have a SAN and back-end storage subsystems that can deliver the performance that you want.\nEssentially, Storwize V7000 performance improvements are gained by using in parallel as many physical disks as possible, which creates a greater level of concurrent I/O to the back-end storage without overloading a single disk or array.\nAssuming that no bottlenecks exist in the SAN or on the disk subsystem, you must follow specific guidelines when you perform the following tasks:\n/SM590000 Creating a storage pool\n/SM590000 Creating volumes\n/SM590000 Connecting to or configuring hosts that use storage presented by a Storwize V7000 clustered system\nFor more information about performance and preferred practices for the Storwize V7000, see IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and Performance Guidelines , SG24-7521.", - "page_start": 103, - "page_end": 103, - "source_file": "sg247938.pdf" - }, - { - "text": "3.12 Host attachment planning\nThe typical FC host attachment to the Storwize V7000 is done through SAN fabric. However, the system allows direct attachment connectivity between its 8 Gb or 16 Gb Fibre Channel ports and host ports. No special configuration is required for host systems that are using this configuration. However, the maximum number of directly attached hosts is severely limited by the number of FC ports on Storwize V7000's nodes.\nThe Storwize V7000 imposes no particular limit on the distance between the Storwize V7000 nodes and host servers. However, for host attachment, the Storwize V7000 supports up to three ISL hops in the fabric. This capacity means that the server to the Storwize V7000 can be separated by up to five FC links, four of which can be 10 km long (6.2 miles) if long wave Small Form-factor Pluggables (SFPs) are used.\nFigure 3-9 shows an example of a supported configuration with Storwize V7000 nodes using shortwave SFPs.\nFigure 3-9 Example of host connectivity\nIn Figure 3-9, the optical distance between Storwize V7000 Node 1 and Host 2 is slightly over 40 km (24.85 miles).\nTo avoid latencies that lead to degraded performance, avoid ISL hops whenever possible. In an optimal setup, the servers connect to the same SAN switch as the Storwize V7000 nodes.\nNote: Before attaching host systems to Storwize V7000, review the Configuration Limits and Restrictions for the IBM System Storage Storwize V7000 at this IBM Support web page.", - "page_start": 91, - "page_end": 91, - "source_file": "sg247938.pdf" - }, - { - "text": "3.6.2 Zoning\nIn Storwize V7000 deployments, the SAN fabric must have two distinct zone classes:\n/SM590000 Host zones: Allows communication between Storwize V7000Storwize V7000 and hosts.\n/SM590000 Storage zone: Allows communication between Storwize V7000 and back-end storage.\nIn clustered configurations, a third zone is required that allows communication between storage system nodes (intra-cluster traffic).\nChapter 3. Planning\n51\n52\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nFigure 3-2 shows the Storwize V7000 zoning classes.\nFigure 3-2 Storwize V7000 zoning classes\nThe fundamental rules of Storwize V7000 zoning are described next. However, also review the latest zoning guidelines and requirements when designing zoning for the planned solution by searching for 'SAN configuration and zoning rules summary' at IBM Knowledge Center.\nNote: Configurations that use Metro Mirror, Global Mirror, N_Port ID Virtualization, or long-distance links have extra zoning requirements. Do not follow only the general zoning rules if you plan to use any of these.\nThe FCoE fabric uses the same set of zoning rules as the Fibre Channel fabric.", - "page_start": 72, - "page_end": 73, - "source_file": "sg247938.pdf" - }, - { - "text": "3.6 SAN configuration planning\nStorwize V7000 cluster can be configured with a minimum of two (and up to eight) Storwize V7000 nodes. These nodes can use SAN fabric to communicate with back-end storage subsystems and hosts.", - "page_start": 71, - "page_end": 71, - "source_file": "sg247938.pdf" - }, - { - "text": "2.3.1 IBM Storwize V7000 models\nThe first generation of IBM Storwize V7000 hardware is not supported by IBM Spectrum Virtualize V8.1. Any attempt to upgrade to V8.1 is rejected by the software. The last supported version for first-generation Storwize V7000 is V7.8.", - "page_start": 35, - "page_end": 35, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "Is '1oijizer--10108453535318919918883384---jhjjzhiuhzrh--14584joiz///KK ' valid for a pool?", - "target_page": 218, - "target_passage": "Naming rules: When you choose a name for a pool, the following rules apply: \u0002 Names must begin with a letter. \u0002 The first character cannot be numeric. \u0002 The name can be a maximum of 63 characters. \u0002 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space. \u0002 Names must not begin or end with a space. \u0002 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC. \u0002 The default object name is valid (object prefix with an integer). \u0002 Objects can be renamed to their current names", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "#General configuration:\n#---------------------------------\nssh_user = \"root\" # Image username\nssh_user_password = \"\" # Image password\nuser_public_key = \"ssh-rsa\nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U vpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz hDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu yVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/ FiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\"\ndns1 = \"192.168.11.210\"\n# DNS server 1\ndns_domain = \"domain.example.com\" # DNS Domain Name", - "page_start": 131, - "page_end": 131, - "source_file": "sg248459.pdf" - }, - { - "text": "#General configuration:\n#---------------------------------\nssh_user = \"root\" # Image username\nssh_user_password = \"\" # Image password\nuser_public_key = \"ssh-rsa\nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U vpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz hDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu yVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/ FiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\"\ndns1 = \"192.168.11.210\"\n# DNS server 1\ndns_domain = \"domain.example.com\" # DNS Domain Name", - "page_start": 132, - "page_end": 132, - "source_file": "sg248459.pdf" - }, - { - "text": "cat terraform.tfvars\n#PowerVC (OpenStack) #---------------------------------powervc_user = \"ocpadmin\" # PowerVC user powervc_password = \"\" # PowerVC password powervc_server = \"192.168.11.31\" # PowerVC IP or hostname powervc_project = \"ocp-project\" # PowerVC project(tenant) name #General configuration: #---------------------------------ssh_user = \"root\" # Image username ssh_user_password = \"password\" # Image password\nuser_public_key = \"ssh-rsa\nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U vpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz hDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu yVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/ FiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\"\ndns1 = \"192.168.11.210\" # DNS server 1", - "page_start": 129, - "page_end": 130, - "source_file": "sg248459.pdf" - }, - { - "text": "References\n16. Langley P, Müller-Schwefe G, Nicolaou A, Liedgens H, Pergolizzi J, Varrassi G. The societal impact of pain in the European Union: health-related quality of life and healthcare resource utilization. J Med Econ. 2010;13:571 -81.\n17. Pérez C, Navarro A, Saldaña MT, Wilson K, Rejas J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin J Pain. 2015;31:273 -9.\n18. Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011;91:712 -21.\n19. George SZ, Beneciuk JM, Lentz TA, Wu SS. The Optimal Screening for Prediction of Referral and Outcome (OSPRO) in patients with musculoskeletal pain conditions: a longitudinal validation cohort from the USA. BMJ Open. 2017;7:e015188.\n20. George SZ, Beneciuk JM, Lentz TA, Wu SS, Dai Y, Bialosky JE, Zeppieri G Jr. Optimal Screening for Prediction of Referral and Outcome (OSPRO) for Musculoskeletal Pain Conditions: Results From the Validation Cohort. J Orthop Sports Phys Ther. 2018;48(6):460 -75.\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 14 of 14", - "page_start": 12, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "References\n[44] Renthal W, Tochitsky I, Yang L, Cheng YC, Li E, Kawaguchi R, Geschwind DH, Woolf CJ. Transcriptional reprogramming of distinct peripheral sensory neuron subtypes after axonal injury. Neuron 2020; 108:128-44.e9.\n[45] Schindelin J, Arganda-Carreras I, Frise E, Kaynig V, Longair M, Pietzsch T, Preibisch S, Rueden C, Saalfeld S, Schmid B, Tinevez J-Y, White DJ, Hartenstein V, Eliceiri K, Tomancak P, Cardona A. Fiji: an open-source platform for biological-image analysis. Nat Methods 2012;9:676-82.\n[46] Schmalbruch H. Loss of sensory neurons after sciatic nerve section in the rat. Anat Rec 1987;219:323-9.\n[47] Schmitz C, Hof PR. Design-based stereology in neuroscience. Neuroscience 2005;130:813-31.\n[48] Schulte A, Degenbeck J, Aue A, Schindeh utte M, Schlott F, Schneider M, Monoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL. Humandorsalroot ganglia after plexus injury: either preservation or loss of the multicellular unit. bioRxiv 2023.02.06.526934.\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue A. Unbiased analysis of the dorsal root ganglion after peripheral nerve injury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN 2023;164:728-40.\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H okfelt T. Effect of peripheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J\nPAIN ®", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "REFERENCES\n34 . Shing HC, Shivade C, Pourdamghani N, et al. Towards clinical encounter summarization: learning to compose discharge summaries from prior notes. arXiv . Preprint posted online April 27, 2021. doi:10.48550/arXiv. 2104.13498\n35 . Van Veen D, Van Uden C, Blankemeier L, et al. Adapted large language models can outperform medical experts in clinical text summarization. Nat Med . 2024;30(4):1134-1142. doi:10.1038/s41591-024-02855-5\n36 . Tang L, Sun Z, Idnay B, et al. Evaluating large language models on medical evidence summarization. NPJ Digit Med . 2023;6(1):158. doi:10.1038/s41746-023-00896-7\n37 . Goswami J, Prajapati KK, Saha A, Saha AK. Parameter-efficient fine-tuning large language model approach for hospital discharge paper summarization. Appl Soft Comput . 2024;157:111531. doi:10.1016/j.asoc.2024.111531\n38 . Huang KT, Mehta NH, Gupta S, See AP, Arnaout O. Evaluation of the safety, accuracy, and helpfulness of the GPT-4.0 large language model in neurosurgery. J Clin Neurosci . 2024;123:151-156. doi:10.1016/j.jocn.2024.03.021\n39 . Giuffrè M, Kresevic S, You K, et al. Systematic review: the use of large language models as medical chatbots in digestive diseases. Aliment Pharmacol Ther . 2024;60(2):144-166. doi:10.1111/apt.18058\n40 . Tailor PD, Dalvin LA, Chen JJ, et al. A comparative study of responses to retina questions from either experts, expert-edited large language models or large language models alone. Ophthalmol Sci . 2024;4(4):100485. doi:10. 1016/j.xops.2024.100485", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed8.pdf" - }, - { - "text": "A. Generate the High Order Terms by Coupling to Optical Phonon.\nH SL = ∑ cluster j [ ( J cluster / 2)( S j 1 + S j 2 + S j 3 + S j 4 ) 2 + k 2 ( Q E 1 j ) 2 + k 2 ( Q E 2 j ) 2 + J ' ( Q E 1 j S j 1 · S j 4 + S j 2 · S j 3 + S j 2 · S j 4 + S j 1 · S j 3 -2 S j 1 · S j 2 -2 S j 3 · S j 4 √ 12 + Q E 2 j S j 2 · S j 4 + S j 1 · S j 3 -S j 1 · S j 4 -S j 2 · S j 3 2 )] -∑ x -links 4 J x k 2 3 J ' 2 Q E 1 j · Q E 1 k -∑ y -links 4 J y k 2 3 J ' 2 Q E 2 j · Q E 2 k + ∑ z -links 16 J z k 4 9 J ' 4 Q E 1 j Q E 2 j · Q E 1 k Q E 2 k (14)\nThe single cluster spin-lattice Hamiltonian [first three lines in (14)] is quite natural. However we need some\nharmonic(on x - and y -links of honeycomb lattice) and anharmonic coupling (on z -links) between optical phonon\n6\nmodes of neighboring tetrahedra. And these coupling constants λ x,y,z need to be tuned to produce J x,y,z of the Kitaev model. This is still not easy to implement in solid state systems. At lowest non-trivial order of perturbative expansion, we do get our model (9). Higher order terms in expansion destroy the exact solvability, but may be controlled by the small parameters λ x,y,z /k .", - "page_start": 5, - "page_end": 6, - "source_file": "1001.0266.pdf" - }, - { - "text": "References\n51. Sterne JAC, White IR, Carlin JB, Spratt M, Royston P, Kenward MG, et al. Multiple imputation for missing data in epidemiological and clinical research: potential and pitfalls. BMJ. 2009;338:b2393.\n52. Bishop MD, Mintken PE, Bialosky JE, Cleland JA. Patient expectations of benefit from interventions for neck pain and resulting influence on outcomes. J Orthop Sports Phys Ther. 2013;43:457 -65.\n53. Bialosky JE, Bishop MD, Cleland JA. Individual expectation: an overlooked, but pertinent, factor in the treatment of individuals experiencing musculoskeletal pain. Phys Ther. 2010;90:1345 -55.\n54. Hanney WJ, Masaracchio M, Liu X, Kolber MJ. The influence of physical therapy guideline adherence on healthcare utilization and costs among patients with low back pain: a systematic review of the literature. PLoS One. 2016;11:e0156799.\n55. Childs JD, Fritz JM, Wu SS, Flynn TW, Wainner RS, Robertson EK, et al. Implications of early and guideline adherent physical therapy for low back pain on utilization and costs. BMC Health Serv Res. 2015;15 https://doi.org/ 10.1186/s12913-015-0830-3.\n56. Yu S-T, Chang H-Y, Lin M-C, Lin Y-H. Agreement between self-reported and health insurance claims on utilization of health care: a population study. J Clin Epidemiol. 2009;62:1316 -22.\n57. Petrou S, Murray L, Cooper P, Davidson LL. The accuracy of self-reported healthcare resource utilization in health economic studies. Int J Technol Assess Health Care. 2002;18:705 -10.\n58. Short ME, Goetzel RZ, Pei X, Tabrizi MJ, Ozminkowski RJ, Gibson TB, et al. How accurate are self-reports? Analysis of self-reported health care utilization and absence when compared with administrative data. J Occup Environ Med. 2009;51:786 -96.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "Appendix B: Derivation of the Terms Generated by Second Order Perturbation of Inter-cluster Magnetic Interactions\n-λ 2 6 J cluster [ 9 + 9 r 2 8 +2 r P jk [ S j 1 · ( S j 3 -S j 4 )][ S k 1 · ( S k 3 -S k 4 )] P jk -(3 / 2) P jk ( S k 3 · S k 4 + r 2 S j 3 · S j 4 ) P jk ] = -λ 2 6 J cluster [ 9 + 9 r 2 8 +2 r (3 / 4) τ y j τ y k -(3 / 2) P jk ( S k 3 · S k 4 + r 2 S j 3 · S j 4 ) P jk ]\nSo we can choose -( r λ 2 ) / (4 J cluster ) = -J y , and include the last intra-cluster S k 3 · S k 4 + r 2 S j 3 · S j 4 term in the first order perturbation.\nTherefore we can choose the following perturbation on y -links (not unique),\nλ y H perturbation , y = λ y [ S j 1 · S k 1 +sgn( J y ) · ( S j 3 -S j 4 ) · ( S k 3 -S k 4 )] -| J y | ( S j 3 · S j 4 + S k 3 · S k 4 )\nwith λ y = √ 4 | J y | · J cluster , r = sgn( J y ) is the sign of J y . The τ z j τ z k term is again more difficult to get. We use the representation of τ z by spin-chirality (6). And consider the following perturbation\nH perturbation = S j 2 · ( S j 3 × S j 4 ) + r S k 2 · ( S j 3 × S j 4 )\nThe first order term in (15) vanishes due to the same reason as before. There are four terms in the second order perturbation. The first one is\nλ 2 P jk S j 2 · ( S k 3 × S k 4 )(1 -P jk ) × [0 -H cluster j -H cluster k ] -1 × (1 -P jk ) S j 2 · ( S k 3 × S k 4 ) P jk", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0266.pdf" - }, - { - "text": "References\n21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent musculoskeletal pain at 12 months: a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome (OSPRO) validation cohort study. Phys Ther. 2018;98:290 -301.\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009; 169:251 -8.\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain: population perspectives. J Pain Off J Am Pain Soc. 2010;11:343 -50.\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999;83:157 -62.\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999;83:533 -9.\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale in patients with low back pain. Spine. 2005;30:1331 -4.\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip Physiol Ther. 2008;31:491 -502.\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity. J Manip Physiol Ther. 1991;14:409 -15.\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability questionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to rehabilitation and education. New York: Manchester University Press; 1989. p. 187 -204.\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001;81:776 -88.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "I want to start a company that automates kitchen tasks, does that sound like a good idea for 2025?", - "target_page": 1, - "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Example:\n'During the next two weeks, I will do everything I can to ensure a smooth transition for the company. If required, I am more than willing to assist with the hiring and training of the new Assistant IT Manager.'", - "page_start": 49, - "page_end": 49, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Smart home automation\nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Technological unemployment\nEconomists have frequently highlighted the risks of redundancies from AI, and speculated about unemployment if there is no adequate social policy for full employment. [255]\nIn the past, technology has tended to increase rather than reduce total employment, but economists acknowledge that \"we're in uncharted territory\" with AI. [256] A survey of economists showed disagreement about whether the increasing use of robots and AI will cause a substantial increase in longterm unemployment, but they generally agree that it could be a net benefit if productivity gains are redistributed. [257] Risk estimates vary; for example, in the 2010s, Michael Osborne and Carl Benedikt Frey estimated 47% of U.S. jobs are at \"high risk\" of potential automation, while an OECD report classified only 9% of U.S. jobs as \"high risk\". [p][259] The methodology of speculating about future employment levels has been criticised as lacking evidential foundation, and for implying that technology, rather than social policy, creates unemployment, as opposed to redundancies. [255] In April 2023, it was reported that 70% of the jobs for Chinese video game illustrators had been eliminated by generative artificial intelligence. [260][261]\nUnlike previous waves of automation, many middle-class jobs may be eliminated by artificial intelligence; The Economist stated in 2015 that \"the worry that AI could do to white-collar jobs what steam power did to blue-collar ones during the Industrial Revolution\" is \"worth taking seriously\". [262] Jobs at extreme risk range from paralegals to fast food cooks, while job demand is likely to increase for care-related professions ranging from personal healthcare to the clergy. [263]\nFrom the early days of the development of artificial intelligence, there have been arguments, for example, those put forward by Joseph Weizenbaum, about whether tasks that can be done by computers actually should be done by them, given the difference between computers and humans, and between quantitative\ncalculation and qualitative, value-based judgement. [264]", - "page_start": 17, - "page_end": 18, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Chapter 13 Conclusion: Some Personal Thoughts and Opinions\nI first started working with classification-based languages when I worked at the Information Sciences Institute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US Department of Defense and their contractors. Since then, I've followed the progress of the technology, especially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great promise in the technology. When I first discovered Protégé it was a great experience. It is one of the best supported and most usable free tools I've ever seen, and it always surprised me that there weren't more corporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope this tutorial helps in a small way to accelerate the adoption of this powerful and robust tool.\n88", - "page_start": 88, - "page_end": 88, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "PRACTICAL AND PROFESSIONAL\nSomething of a paradox, too; highly competitive but approachable; stylish but never a slave to fashion. I have a true talent for leadership. I'm stable, steady, reliable, and efficient. At the same time, I'm good-looking, good-natured, and good-humored. Seek successful business person driven by values, with a 'whatever it takes' attitude - just like me, practical and professional.\nTHE\nHON COMPANY", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "/SM590000 Data Capture\nEnterprises produce and receive massive volumes of new information every day to make decisions, manage operations, and create value. Most that information is inaccessible and invisible to the business applications that need it most, which undermines the ability of decision makers to truly understand the opportunities and constraints that are affecting their organization.\nChapter 3. IBM Cloud Paks: Middleware anywhere\n47\n48\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nBy standardizing and automating data extraction processes, enterprises can more productively and accurately extract knowledge and intelligence from unstructured content to create insights that accurately reflect operational reality, which enables more effective digital transformation initiatives and better business outcomes. Intelligent data extraction is an innovative evolution in standard data capture that extends optical character recognition (OCR), AI, and other techniques to identify and extract information from unstructured content.\n/SM590000 Tasks\nAutomating repetitive tasks saves time and money. Robotic process automation bots expand the value of an automation platform by completing tasks faster, which allows employees to perform higher-value work. Robotic process automation (RPA) is the use of software bots to automate highly repetitive, routine tasks that are normally performed by knowledge workers.", - "page_start": 62, - "page_end": 63, - "source_file": "sg248459.pdf" - }, - { - "text": "The top AI-powered tech trends in 2025\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From enhancing our daily routines to transforming entire industries, AI's impact is undeniable.\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and personalization.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Agents\nArtificial intelligent (AI) agents are software entities designed to perceive their environment, make decisions, and take actions autonomously to achieve specific goals. These agents can interact with users, their environment, or other agents. AI agents are used in various applications, including virtual assistants, chatbots, autonomous vehicles, game-playing systems, and industrial robotics. AI agents operate within the constraints of their programming, available computational resources, and hardware limitations. This means they are restricted to performing tasks within their defined scope and have finite memory and processing capabilities. In real-world applications, AI agents often face time constraints for decision-making and action execution. Many AI agents incorporate learning algorithms, enabling them to improve their performance over time through experience or training. Using machine learning, AI agents can adapt to new situations and optimise their behaviour for their designated tasks. [175][176][177]\nVincent van Gogh in watercolour created by generative AI software", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "EDITOR'S PICKS\nEN\nHave your say! Complete our 2025 Media Survey\nRetrain your way to a new job\nThe top AI-powered tech trends in 2025", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "A CASE STUDY IN QUALITY\nGreat, high-quality design creates better work environments and happier end-users. Whether we're building lateral files (the first product for which we became known) or designing awardwinning seating, like our #19 ® chair, the Allsteel core message remains constant: the highest quality in functionality, durability, and service.\nToday's Allsteel is about a broad array of workplace furniture solutions: new, exciting panel and desking systems, storage, seating, and tables that offer a unique counterpoint to the sea of sameness provided by most office furniture. Working closely with architects and designers, we target the contract market, providing project-driven and design-oriented office solutions. Our rapid modeling and prototyping allows for equally rapid product development, a reflection of our agile, lean culture. As innovative as many of our products are, design innovation - for us - is simply what happens along the way to solving customer problems.\nSome of our products, like the #19 ® chair, are iconographically associated with the Allsteel name, and are quite influential in our brand building efforts. Our two newest enterprises are Terrace ® 2.6 - a fast-growing systems line providing enormous flexibility and durability - and Get Set TM - an incredibly versatile line of multi-purpose room tables, chairs, and\ncommunication products. All of our products respond completely to the needs of end-users because that's where the design process starts.\nIn all that we do, our main focus is to identify end-user problems and solve them better than anyone else. The majority of our customers are large corporations with multiple locations worldwide. According to the senior vice president responsible for the global design, construction, and project management of an internationally renowned financial services company, 'Allsteel offers extremely attractive, cost-effective furniture solutions. Your manufacturing and service are best in class you turn everything around with impressive swiftness. There's really not much in the market to beat you.'\nWell-designed, forward-thinking, and glad to be of service. Allsteel is proud to uphold our long heritage of quality.\n20", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "I want to help my parents who are in residential care, are there any trendy AI-related devices I could help them with? ", - "target_page": 1, - "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "AI welfare and rights\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), and if so, to what degree. [388] But if there is a significant chance that a given machine can feel and suffer, then it may be entitled to certain rights or welfare protection measures, similarly to animals. [389][390] Sapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may provide another moral basis for AI rights. [389] Robot rights are also sometimes proposed as a practical way to integrate autonomous agents into society. [391]\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI systems. Similarly to the legal status of companies, it would have conferred rights but also responsibilities. [392] Critics argued in 2018 that granting rights to AI systems would downplay the importance of human rights, and that legislation should focus on user needs rather than speculative futuristic scenarios. They also noted that robots lacked the autonomy to take part to society on their own. [393][394]\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI sentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot analogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created and carelessly exploited. [390][389]", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "AI-powered computing\nAI-powered computing, such as Intel-powered laptops - or AI PC - is at the forefront of technological advancement. But what, exactly, is an AI PC? They're computers that have AI built into their processors - also known as the brain of the computer - which optimizes performance, enhances security and provides a more personalized experience as they learn from your usage patterns. For consumers, this means faster, smarter and more secure computing tailored to your individual needs.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Sexuality\nApplications of AI in this domain include AI-enabled menstruation and fertility trackers that analyze user data to offer prediction, [138] AI-integrated sex toys (e.g., teledildonics), [139] AI-generated sexual education content, [140] and AI agents that simulate sexual and romantic partners (e.g., Replika). [141] AI is also used for the production of non-consensual deepfake pornography, raising significant ethical and legal concerns. [142]\nAI technologies have also been used to attempt to identify online gender-based violence and online sexual grooming of minors. [143][144]", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Artificial intelligence\nArtificial intelligence ( AI ), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. [1] Such machines may be called AIs.\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, many AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.\" [2][3]\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural language processing, perception, and support for robotics. [a] General intelligence-the ability to complete any task performed by a human on an at least equal level-is among the field's long-term goals. [4] To reach these goals, AI researchers have adapted and integrated a wide range of techniques, including search and mathematical optimization, formal logic, artificial neural networks, and methods based on statistics, operations research, and economics. [b] AI also draws upon psychology, linguistics, philosophy, neuroscience, and other fields. [5]", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Evaluating approaches to AI\nNo established unifying theory or paradigm has guided AI research for most of its history. [aa] The unprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much so that some sources, especially in the business world, use the term \"artificial intelligence\" to mean \"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics argue that these questions may have to be revisited by future generations of AI researchers.", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Defining artificial intelligence\nSome authors have suggested in practice, that the definition of AI is vague and difficult to define, with contention as to whether classical algorithms should be categorised as AI, [367] with many companies during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not actually use AI in a material way\". [368]", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "The top AI-powered tech trends in 2025\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From enhancing our daily routines to transforming entire industries, AI's impact is undeniable.\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and personalization.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Agents\nArtificial intelligent (AI) agents are software entities designed to perceive their environment, make decisions, and take actions autonomously to achieve specific goals. These agents can interact with users, their environment, or other agents. AI agents are used in various applications, including virtual assistants, chatbots, autonomous vehicles, game-playing systems, and industrial robotics. AI agents operate within the constraints of their programming, available computational resources, and hardware limitations. This means they are restricted to performing tasks within their defined scope and have finite memory and processing capabilities. In real-world applications, AI agents often face time constraints for decision-making and action execution. Many AI agents incorporate learning algorithms, enabling them to improve their performance over time through experience or training. Using machine learning, AI agents can adapt to new situations and optimise their behaviour for their designated tasks. [175][176][177]\nVincent van Gogh in watercolour created by generative AI software", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Misinformation\nYouTube, Facebook and others use recommender systems to guide users to more content. These AI programs were given the goal of maximizing user engagement (that is, the only goal was to keep people watching). The AI learned that users tended to choose misinformation, conspiracy theories, and extreme partisan content, and, to keep them watching, the AI recommended more of it. Users also tended to watch more content on the same subject, so the AI led people into filter bubbles where they received multiple versions of the same misinformation. [215] This convinced many users that the misinformation was true, and ultimately undermined trust in institutions, the media and the government. [216] The AI program had correctly learned to maximize its goal, but the result was harmful to society. After the U.S. election in 2016, major technology companies took steps to mitigate the problem .\nIn 2022, generative AI began to create images, audio, video and text that are indistinguishable from real photographs, recordings, films, or human writing. It is possible for bad actors to use this technology to create massive amounts of misinformation or propaganda. [217] AI pioneer Geoffrey Hinton expressed concern about AI enabling \"authoritarian leaders to manipulate their electorates\" on a large scale, among other risks. [218]", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Artificial intelligence\nArtificial intelligence was founded as an academic discipline in 1956, [6] and the field went through multiple cycles of optimism throughout its history, [7][8] followed by periods of disappointment and loss of funding, known as AI winters. [9][10] Funding and interest vastly increased after 2012 when deep learning outperformed previous AI techniques. [11] This growth accelerated further after 2017 with the transformer architecture, [12] and by the early 2020s many billions of dollars were being invested in AI and the field experienced rapid ongoing progress in what has become known as the AI boom. The emergence of advanced generative AI in the midst of the AI boom and its ability to create and modify content exposed several unintended consequences and harms in the present and raised concerns about the risks of AI and its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety and benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "Is the topic of finance trending among AI topics for 2015 in Canada?", - "target_page": 1, - "target_passage": "Financial services", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Financial services\nAI is also making waves in the financial sector, offering smarter and more secure ways to manage money. From AI-driven investment platforms that provide personalized financial advice to fraud detection systems that protect against cyber threats, AI can analyze vast amounts of data to identify trends and make more informed financial decisions.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Finance\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail online banking to investment advice and insurance, where automated \"robot advisers\" have been in use for some years. [161]\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly innovative AI-informed financial products and services: \"the deployment of AI tools will simply further automatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice in the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension innovation.\" [162]", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Ten Year Summary\n(expenses) / income, 2009.AIFRS = 3,509. EBITDA, 2013.AIFRS = 95,010. EBITDA, 2012.AIFRS = 166,732. EBITDA, 2011.AIFRS = 46,481. EBITDA, 2010.AIFRS = 98,178. EBITDA, 2009.AIFRS = 46,330. Impairment losses, 2013.AIFRS = (332,808). Impairment losses, 2012.AIFRS = -. Impairment losses, 2011.AIFRS = -. Impairment losses, 2010.AIFRS = -. Impairment losses, 2009.AIFRS = -. Depreciation & amortisation, 2013.AIFRS = (85,595). Depreciation & amortisation, 2012.AIFRS = (67,553). Depreciation & amortisation, 2011.AIFRS = ( 2 7, 7 7 2 ). Depreciation & amortisation, 2010.AIFRS = (14,004). Depreciation & amortisation, 2009.AIFRS = (11,575). EBIT, 2013.AIFRS = (323,393). EBIT, 2012.AIFRS = 99,179. EBIT, 2011.AIFRS = 18,709. EBIT, 2010.AIFRS = 84,174. EBIT, 2009.AIFRS = 34,755. Net finance (costs) / income, 2013.AIFRS = (16,222). Net finance (costs) / income, 2012.AIFRS = ( 7, 9 0 2 ). Net finance (costs) / income, 2011.AIFRS = (922). Net finance (costs) / income, 2010.AIFRS = (1,823). Net finance", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Artificial intelligence\nArtificial intelligence was founded as an academic discipline in 1956, [6] and the field went through multiple cycles of optimism throughout its history, [7][8] followed by periods of disappointment and loss of funding, known as AI winters. [9][10] Funding and interest vastly increased after 2012 when deep learning outperformed previous AI techniques. [11] This growth accelerated further after 2017 with the transformer architecture, [12] and by the early 2020s many billions of dollars were being invested in AI and the field experienced rapid ongoing progress in what has become known as the AI boom. The emergence of advanced generative AI in the midst of the AI boom and its ability to create and modify content exposed several unintended consequences and harms in the present and raised concerns about the risks of AI and its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety and benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Regulation\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only 35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". [304] A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to humanity. [311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional 41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \"not very important\" and 8% responding \"not at all important\". [312][313]\nIn November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the near and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks. [314] 28 countries including the United States, China, and the European Union issued a declaration at the start of the summit, calling for international co-operation to manage the challenges and risks of artificial intelligence. [315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety commitments on the development of AI. [317][318]", - "page_start": 20, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Ten Year Summary\n(A$'000), 2009.AIFRS = . Current assets - cash, 2013.AIFRS = 32,987. Current assets - cash, 2012.AIFRS = 90,623. Current assets - cash, 2011.AIFRS = 35,864. Current assets - cash, 2010.AIFRS = 49,098. Current assets - cash, 2009.AIFRS = 29,680. Current assets - other, 2013.AIFRS = 109,575. Current assets - other, 2012.AIFRS = 103,433. Current assets - other, 2011.AIFRS = 70,280. Current assets - other, 2010.AIFRS = 54,203. Current assets - other, 2009.AIFRS = 27,848. Non-current assets, 2013.AIFRS = 6 2 7, 4 2 6. Non-current assets, 2012.AIFRS = 854,403. Non-current assets, 2011.AIFRS = 688,919. Non-current assets, 2010.AIFRS = 265,774. Non-current assets, 2009.AIFRS = 217,4 4 5. Total assets, 2013.AIFRS = 769,988. Total assets, 2012.AIFRS = 1,048,459. Total assets, 2011.AIFRS = 795,063. Total assets, 2010.AIFRS = 369,075. Total assets, 2009.AIFRS = 274,973. Total borrowings, 2013.AIFRS = 199,758. Total borrowings, 2012.AIFRS = 157,544. Total borrowings, 2011.AIFRS = 99,896. Total borrowings, 2010.AIFRS = 11,064. Total borrowings, 2009.AIFRS = 2,144. Other liabilities, 2013.AIFRS = 96,270. Other liabilities, 2012.AIFRS = 115,102. Other liabilities, 2011.AIFRS = 88,243. Other liabilities, 2010.AIFRS = 41,968. Other liabilities, 2009.AIFRS = 27,789. Total liabilities, 2013.AIFRS = 296,028. Total liabilities, 2012.AIFRS = 272,646. Total", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Regulation\nThe regulation of artificial intelligence is the development of public sector policies and laws for promoting and regulating AI; it is therefore related to the broader regulation of algorithms. [302] The regulatory and policy landscape for AI is an emerging issue in jurisdictions globally. [303] According to AI Index at Stanford, the annual number of AI-related laws passed in the 127 survey countries jumped from one passed in 2016 to 37 passed in 2022 alone. [304][305] Between 2016 and 2020, more than 30 countries adopted dedicated strategies for AI. [306] Most EU member states had released national AI strategies, as had Canada, China, India, Japan, Mauritius, the Russian Federation, Saudi Arabia, United Arab Emirates, U.S., and\nThe first global AI Safety Summit was held in 2023 with a declaration calling for international cooperation.\nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia and Tunisia. [306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a need for AI to be developed in accordance with human rights and democratic values, to ensure public confidence and trust in the technology. [306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher published a joint statement in November 2021 calling for a government commission to regulate AI. [307] In 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they believe may happen in less than 10 years. [308] In 2023, the United Nations also launched an advisory body to provide recommendations on AI governance; the body comprises technology company executives, governments officials and academics. [309] In 2024, the Council of Europe created the first international legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence and Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United States, the United Kingdom, and other signatories. [310]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "The top AI-powered tech trends in 2025\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From enhancing our daily routines to transforming entire industries, AI's impact is undeniable.\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and personalization.", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Ten Year Summary\n(A$'000), 2013.AIFRS = . PROFIT & LOSS (A$'000), 2012.AIFRS = . PROFIT & LOSS (A$'000), 2011.AIFRS = . PROFIT & LOSS (A$'000), 2010.AIFRS = . PROFIT & LOSS (A$'000), 2009.AIFRS = . Sales revenue, 2013.AIFRS = 329,282. Sales revenue, 2012.AIFRS = 357,372. Sales revenue, 2011.AIFRS = 172,356. Sales revenue, 2010.AIFRS = 175,480. Sales revenue, 2009.AIFRS = 113,015. Operating expenses, 2013.AIFRS = (195,064). Operating expenses, 2012.AIFRS = (171,505). Operating expenses, 2011.AIFRS = ( 8 6,147 ). Operating expenses, 2010.AIFRS = ( 74,305). Operating expenses, 2009.AIFRS = (65,599). Administration expenses, 2013.AIFRS = (15,515). Administration expenses, 2012.AIFRS = (12,737). Administration expenses, 2011.AIFRS = (11,304). Administration expenses, 2010.AIFRS = (3,615). Administration expenses, 2009.AIFRS = (4,595). Other (expenses) / income, 2013.AIFRS = (23,693). Other (expenses) / income, 2012.AIFRS = (6,398). Other (expenses) / income, 2011.AIFRS = (28,424). Other (expenses) / income, 2010.AIFRS = 618. Other", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Is there any chance that my cousin has been granted financial aid from Chesapeak Energy? He's studying at a college in Oklahoma.", - "target_page": 26, - "target_passage": "hat’s why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Educational Impact\nWe are also proud to help prepare tomorrow's leaders today. In 2010 Chesapeake supported universities, schools, academic chairs, scholarships and other educational programs with contributions totaling $5.4 million.\nInvesting in programs that promote technology and innovation is a key to our country's success. That's why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM), a public, tuition-free, residential high school located in Oklahoma City for juniors and seniors with exceptional abilities. The extremely competitive school is helping train the next generation of scientists and mathematicians.\nWe also established the Chesapeake Energy Presidential Scholars Program at the Oklahoma City University Meinders School of Business, making a $5.0 million commitment to be distributed over the next five years. The Chesapeake Scholars Program will provide up to $25,000 per year in tuition\nto selected students pursuing careers in finance, economics, accounting, marketing, business administration, computer science and information technology. In addition, scholars will take part in a Chesapeake Presidential Leadership Course facilitated by faculty members in coordination with designated Chesapeake leadership coaches, including a Chesapeake senior vice president and OCU alumni.\nIn 2007 Chesapeake launched a scholarship program in Texas with an initial $1.25 million contribution, challenging the cities of Fort Worth and Dallas to match its gift within a year. The cities responded and matched the gift, so Chesapeake in 2008 added another $1.25 million to the fund, bringing the total to $3.75 million. The Chesapeake Scholarship Fund currently funds the cost of higher education for 48 minority students. The fund provides each student $20,000 a year for up to four years at the school of their choice. To date more than $1.0 million has been distributed to deserving local students.\nTo help ensure the training of qualified geologists, engineers, landmen and energy lawyers in the next generation, we award scholarships to students pursuing energy-related degrees. We also help mentor them through Chesapeake's Peak Program. Junior- and senior-level scholarship recipients are paired with Chesapeake employee mentors who help develop students' knowledge and provide career advice. There are currently 25 mentors and 40 scholarship recipients participating in the Peak Program.", - "page_start": 25, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Aubrey K. McClendon\nChairman of the Board and Chief Executive Officer Chesapeake Energy Corporation Oklahoma City, Oklahoma", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "V. Burns Hargis (1)\nPresident Oklahoma State University Stillwater, Oklahoma", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Junior Credit Facility\nIn August 2013, Sundance Energy, Inc. ('Sundance Energy'), a wholly owned subsidiary of the Company, entered into a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the 'Junior Credit Facility'), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit Facility matures in June 2018 and is secured by a second priority lien on substantially all of the Company's assets. Upon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms of the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the Company's borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the Junior Credit Facility remains at $35 million.\n- 86 -", - "page_start": 87, - "page_end": 87, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Utility and Property Tax Risk\nKillam is exposed to volatile utility costs and increasing property taxes. Utility expenses, mainly consisting of oil, natural gas, water and electricity charges, have been subject to considerable price fluctuations over the past several years. Killam has the ability to raise rents on the anniversary date of its leases, subject to the overall rental market conditions, to offset rising energy and utility costs, however rental increases may be limited by market conditions. Killam invests in energy efficiency initiatives to reduce its reliance on utility costs; however Killam remains exposed to price volatility. The Company has the ability to fix rates through the use of swap contracts for a portion of its oil and natural gas consumption to reduce the impact of fluctuations in commodity prices. To address the risk of property tax increases, Killam, along with the assistance of outside consultants, reviews property tax assessments and, where warranted, appeals them.", - "page_start": 59, - "page_end": 59, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Sumitomo Mitsui Finance & Leasing: Promoting recycling and reuse\nAs part of its core leasing operations, As part of its core leasing operations, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is helping reduce customers' environmental helping reduce customers' environmental\nRecycling and reuse of old equipment and machinery\nload through measures such as 'carbon load through measures such as 'carbon neutral leases' (with carbon credits allocated neutral leases' (with carbon credits allocated in proportion to emission volumes of leased in proportion to emission volumes of leased assets) and leasing of environment-friendly assets) and leasing of environment-friendly and energy-saving equipment. and energy-saving equipment.\nLikewise, by trading used machinery and Likewise, by trading used machinery and semiconductor- manufacturing equipment, semiconductor- manufacturing equipment, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is supporting more efficient capital investment supporting more efficient capital investment by its customers, while itself evolving into a by its customers, while itself evolving into a recycling-oriented, environment-friendly recycling-oriented, environment-friendly company. company.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Bank Credit and Letter of Credit Facilities\nWe have $2.5 billion of bank credit and letter of credit facilities. Each of these facilities is unsecured and guaranteed by Rogers Communications Partnership and ranks equally with all of our senior notes and debentures. The terms of our bank credit facility are committed by the participating financial institutions until it expires in July 2017. As at December 31, 2013, there were no advances outstanding under our $2.0 billion bank credit facility and there were letters of credit totalling $0.5 billion outstanding under our letter of credit facilities.", - "page_start": 64, - "page_end": 64, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Donations to charity groups\nEmployees of Sumitomo Mitsui Banking Corporation Europe Employees of Sumitomo Mitsui Banking Corporation Europe (SMBCE) conducted volunteer activities in their time off. (SMBCE) conducted volunteer activities in their time off. SMBCE contributes to charitable organizations through an SMBCE contributes to charitable organizations through an in-house fund and also uses a matching gifts program under in-house fund and also uses a matching gifts program under\nwhich it donates a which it donates a certain amount for certain amount for every donation made every donation made by its employees. by its employees.\nEmployee volunteers who participated in landscape improvement projects\nEurope", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "DEVOTION TO SERVICE\nor us, it is a measure of responsible corporate citizenship. The MGM MIRAGE Corporate Charitable Giving Program is the principal source of financial donations to community and social initiatives. Funded by a percentage of the company's net profits, the Corporate Charitable Giving Program supports various community efforts impacting four critical areas: F\nCHILDHOOD DEVELOPMENT Community-based programs that focus on the overall development and well-being of children.\nCOMMUNITY DEVELOPMENT Programs that focus on low-income or socio-economically disadvantaged communities.\nDIVERSITY Programs which are inclusive receive priority in funding. This includes efforts that encourage economic development and enhance individual and community resources.\nEDUCATION Programs and efforts to strengthen public education from kindergarten through higher education.\nThrough various education partnerships with institutions such as the University of Nevada, we award scholarships to help students achieve their educational goals and to encourage their interest in our business. Additionally, scholarship programs assist the children of our employees with their higher education aspirations", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "Has the Sumitomo Mitsui Financial Group offered help to the elderly?", - "target_page": 6, - "target_passage": "Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycleframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a soundplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives.balance between work and care needs, given that many group employees will later need to nurse ailing relatives", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Further measures needed\n● Share expertise in corporate social responsibility Share expertise in corporate social responsibility with the international community with the international community\n● Improve financial services in preparation for the Improve financial services in preparation for the globalization of operations in Japan (multilingual globalization of operations in Japan (multilingual support) support)\n● Promote diversity Promote diversity\nCSR REPORT 2011\n10\nIn the past, the Sumitomo Group In the past, the Sumitomo Group programs to solve the problem of programs to solve the problem of mine, while the Mitsui Group set up mine, while the Mitsui Group set up give the poorest in society access to give the poorest in society access to corporate social responsibility corporate social responsibility philosophies of both the Sumitomo philosophies of both the Sumitomo years of their existence, we will years of their existence, we will problems facing the international problems facing the international service service operations.operations.\nundertook large-scale afforestation undertook large-scale afforestation pollution around the Besshi copper pollution around the Besshi copper the Mitsui Memorial Hospital to the Mitsui Memorial Hospital to basic medical care. Based on this basic medical care. Based on this DNA embedded in the business DNA embedded in the business and Mitsui groups over the 400 and Mitsui groups over the 400 continue to play our part in solving continue to play our part in solving community through our financial community through our financial", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "www.smfg.co.jp/english\nSumitomo Mitsui Financial Group CSR Report\nDigest version", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Recycling of rare earths used in smart cards\nAt Sumitomo Mitsui Card, rare earths At Sumitomo Mitsui Card, rare earths extracted from IC chips from expired credit extracted from IC chips from expired credit cards are recycled. cards are recycled.\nSumitomo Mitsui Financial Group CSR Report", - "page_start": 11, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Corporate Outline (as of September 30, 2011)\nCompany Name\nBusiness Description\nEstablished\nHead Office\nChairman of the Board\nPresident\nCapital\nStock Exchange Listings\nSumitomo Mitsui Financial Group, Inc. ::\nManagement of banking subsidiaries (under the stipulations of Japan's Banking Act) and of non-bank subsidiaries, as well as the performance of ancillary functions :\nDecember 2, 2002 :\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan :\nMasayuki Oku :\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) :\n¥2,337.8 billion :\nTokyo Stock Exchange (First Section) :\nOsaka Securities Exchange (First Section) Nagoya Stock Exchange (First Section) Note: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Listing on the New York Stock Exchange\nIn November 2010, the Sumitomo Mitsui In November 2010, the Sumitomo Mitsui Financial Group listed on the New York Financial Group listed on the New York Stock Exchange. This move, we believe, not Stock Exchange. This move, we believe, not only significantly increases convenience for only significantly increases convenience for our overseas shareholders and investors, our overseas shareholders and investors, but also broadens our customer base as it but also broadens our customer base as it further increases the transparency of our further increases the transparency of our financial position. Listing on the New York financial position. Listing on the New York Stock Exchange as a socially responsible Stock Exchange as a socially responsible corporation accelerates our evolution into a corporation accelerates our evolution into a global player. global player.\nSumitomo Mitsui Financial Group CSR Report\nSpecific Examples of CSR Activities", - "page_start": 9, - "page_end": 10, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "What can we do now to spur the reconstruction and revitalization of Japan, and help resolve global issues?\nUplifting the nation's spirits Uplifting the nation's spirits\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) Japan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) after the March 11 earthquake and tsunami ('the Great East Japan Earthquake') to a shrinking and aging population, with falling birth rates after the March 11 earthquake and tsunami ('the Great East Japan Earthquake') to a shrinking and aging population, with falling birth rates and increasing numbers of the aged. and increasing numbers of the aged.\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. We must now find ways for people to coexist in harmony with nature, based on a global perspective.\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society Sumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group. and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Sumitomo Mitsui Finance & Leasing: Promoting recycling and reuse\nAs part of its core leasing operations, As part of its core leasing operations, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is helping reduce customers' environmental helping reduce customers' environmental\nRecycling and reuse of old equipment and machinery\nload through measures such as 'carbon load through measures such as 'carbon neutral leases' (with carbon credits allocated neutral leases' (with carbon credits allocated in proportion to emission volumes of leased in proportion to emission volumes of leased assets) and leasing of environment-friendly assets) and leasing of environment-friendly and energy-saving equipment. and energy-saving equipment.\nLikewise, by trading used machinery and Likewise, by trading used machinery and semiconductor- manufacturing equipment, semiconductor- manufacturing equipment, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is supporting more efficient capital investment supporting more efficient capital investment by its customers, while itself evolving into a by its customers, while itself evolving into a recycling-oriented, environment-friendly recycling-oriented, environment-friendly company. company.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Company name abbreviations and other special terminology\nThroughout this report, 'Sumitomo Mitsui Financial Group' or 'SMFG' refers to the holding company alone. 'The SMFG Group' refers to the holding company and its primary domestic and international subsidiaries and affiliates.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Does Chesapeake Energy have a project to reduce excessive water use?", - "target_page": 28, - "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Aqua Renew ®\nCreated to meet the challenge of reducing our water usage, Chesapeake's Aqua Renew ® program uses state-of-the-art technology to recycle pro-\nduced water. Since the company's preliminary reclamation project in\n2006, our focus on water reuse and conservation has become a companywide endeavor, stretching from the Barnett Shale of North Texas to the Marcellus Shale of northern Pennsylvania.\nThe Aqua Renew program has yet to find a limit to how much recycled water could be used without compromising well production. In fact, our Marcellus Shale operations are treating and recycling virtually 100% of produced water (more than 10 million gallons per month) for reuse in our hydraulic fracturing operations. Properly conducted modern fracking is a highly engineered, controlled, sophisticated and safe procedure.\nWith such large volumes of recycled water, the company is seeing more than just environmental advantages. We estimate that this\nGreen operations - Chesapeake's Best Management Practices ensure our operations are as environmentally friendly as possible, while protecting our employees, neighbors and the areas where we operate.\nprocess is saving the company an average of $12 million per year in the Marcellus Shale alone.", - "page_start": 27, - "page_end": 28, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "What advantages does CHK's unique vertical integration strategy provide?\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop aggressively over the next two decades. As a result, we know that our company will consistently utilize a tremendous (and growing) amount of oilfield services for this resource development. This high level of planned drilling activity will create value for the provider of oilfield services, and Chesapeake's strategy is to capture a portion of this value for our shareholders rather than transfer it to third-party vendors whose interests and investments are not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water management equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and fracture stimulation equipment. Chesapeake's activities require a high level of planning and project coordination that is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach creates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment, increased safety and better coordinated logistics. In addition, Chesapeake's control of a large portion of the oilfield service equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply put, faster development of resources maximizes the present value of leasehold. This has been a key advantage for\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Environmentally Friendly Operations\nAt Chesapeake, we realize that the way a great product is produced is as important as the product itself. For example, we have helped pioneer the use of multiwell padsites to drill up to 16 wells from a single location, greatly reducing our land and road use and overall environmental footprint. We use the latest horizontal and directional drilling technology to place wells at a safe distance from homes, schools and businesses. In addition, we build and maintain access roads and work to eliminate soil erosion near our sites, as well as restore local vegetation.\nWe implement advanced, modern protective measures known as Best Management Practices (BMPs) to help ensure energy development is conducted in an environmentally responsible manner. Procedures are implemented throughout our operations to protect freshwater aquifers and reduce environmental impacts. BMPs protect wildlife, air quality, water and landscapes as we work to develop vitally needed domestic energy sources.\nImplemented throughout the entire life cycle of a well, BMPs can be as simple as strategically placing a berm, or land barrier, on locations to control surface water runoff. Others involve cutting-edge operational technologies such as utilizing the most advanced techniques offered in drilling fluids, well casing and cement design. Regardless of complexity, all BMPs are based on the idea that the environmental footprint of\nenergy development should be as small and temporary as possible. These practices are continually evolving and further improving as Chesapeake and the industry develop new innovative techniques and approaches to business.\nIn addition to our BMPs, Chesapeake has also initiated several innovative internal programs focused on water recycling and greener hydraulic fracturing processes.", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Our People\nGreat assets cannot exist without great people, so we take great pride in hiring, training, motivating, rewarding and retaining what we regard\nas the best employees in the industry. From our beginning 22 years ago with 10 employees in Oklahoma City to employing more than 10,000 people across 15 states today, Chesapeake has always focused on building first-class human resources within a distinctive corporate culture. Talk to Chesapeake employees and you will note genuine pride and great enthusiasm about the company and the critical role that we play in delivering increasing quantities of clean and affordable American natural gas and valuable and reliable liquids to energy consumers across the country.\nChesapeake employees are distinctive in other ways as well. They are much younger than the industry average, with half of our almost 4,000 Oklahoma City-based headquarters employees 33 years old or younger. Their enthusiasm and willingness to learn create an\natmosphere of vitality and energy at Chesapeake, important ingredients of our distinctive culture. These attributes, along with a vibrant and attractive corporate headquarters campus, low levels of bureaucracy, great assets and a well-executed corporate strategy combine to create our culture of success and innovation.\nThis has generated extremely positive external feedback as Chesapeake was recently recognized for the fourth consecutive year as one of the FORTUNE 100 Best Companies to Work For ®(3) in the U.S. In fact, we moved up to #32 overall and #1 in our industry - we are very proud of having created and sustained what is now considered the best place to work in all of the U.S. energy production industry.\nIn addition, we were honored in December 2010 at the 12th Annual Platts Global Energy Awards as finalists for CEO of the Year, Community\nFrom our beginning 22 years ago with 10 employees in Oklahoma City to employing more than 10,000 people across 15 states today, Chesapeake has always focused on building first-class human resources within a distinctive corporate culture.\n<< A Chesapeake rig drills in the Marcellus Shale, where the company is the leading leasehold owner, largest producer and most active driller.\nDevelopment Program of the Year, Deal of the Year, Energy Producer of the Year and the Industry Leadership Award. Chesapeake was one of only two companies selected as a finalist in five or more categories. The company was also honored in 2010 with a Certificate of Recognition for our military reserve recruiting efforts, named a 2010 Best Diversity Company by Engineering & Information Technology Magazine and recognized for Best Investor Relations in Energy Sector and Best Investor Relations Website at the 2010 IR Magazine U.S. Awards.", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Educational Impact\nWe are also proud to help prepare tomorrow's leaders today. In 2010 Chesapeake supported universities, schools, academic chairs, scholarships and other educational programs with contributions totaling $5.4 million.\nInvesting in programs that promote technology and innovation is a key to our country's success. That's why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM), a public, tuition-free, residential high school located in Oklahoma City for juniors and seniors with exceptional abilities. The extremely competitive school is helping train the next generation of scientists and mathematicians.\nWe also established the Chesapeake Energy Presidential Scholars Program at the Oklahoma City University Meinders School of Business, making a $5.0 million commitment to be distributed over the next five years. The Chesapeake Scholars Program will provide up to $25,000 per year in tuition\nto selected students pursuing careers in finance, economics, accounting, marketing, business administration, computer science and information technology. In addition, scholars will take part in a Chesapeake Presidential Leadership Course facilitated by faculty members in coordination with designated Chesapeake leadership coaches, including a Chesapeake senior vice president and OCU alumni.\nIn 2007 Chesapeake launched a scholarship program in Texas with an initial $1.25 million contribution, challenging the cities of Fort Worth and Dallas to match its gift within a year. The cities responded and matched the gift, so Chesapeake in 2008 added another $1.25 million to the fund, bringing the total to $3.75 million. The Chesapeake Scholarship Fund currently funds the cost of higher education for 48 minority students. The fund provides each student $20,000 a year for up to four years at the school of their choice. To date more than $1.0 million has been distributed to deserving local students.\nTo help ensure the training of qualified geologists, engineers, landmen and energy lawyers in the next generation, we award scholarships to students pursuing energy-related degrees. We also help mentor them through Chesapeake's Peak Program. Junior- and senior-level scholarship recipients are paired with Chesapeake employee mentors who help develop students' knowledge and provide career advice. There are currently 25 mentors and 40 scholarship recipients participating in the Peak Program.", - "page_start": 25, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "DEAR FELLOW SHAREHOLDERS »\n2010 was a very important year of transition and achievement for Chesapeake, a year in which we initiated three very important strategic shifts: from asset gathering to asset harvesting, from focusing exclusively on natural gas to a balanced focus on natural gas and liquids and from having a leveraged balance sheet to one worthy of an investment grade rating.\nHome to three distinct forms of hydrocarbons: dry natural gas, natural gas liquids and oil, the Eagle Ford Shale in South Texas epitomizes Chesapeake's shift to a balanced focus on natural gas and liquids.\n2010 also marked a truly transformative year for our industry. We and a handful of our peers enhanced our capabilities to find and produce significant new resources of oil and natural gas liquids (collectively, 'liquids') in unconventional formations. Chesapeake and these other companies combined creativity, innovation and technology to reinvent the way that our industry explores for and produces natural gas and liquids.\nFurthermore, 2010 was the year when global energy companies more fully recognized the importance of these developments and the tremendous opportunities that have emerged in the U.S. Through a wide variety of transactions, including several led by Chesapeake, the global energy industry made it clear that the assets owned by Chesapeake and some of its peers are the most attractive in the world. This realization has already increased the value of highquality unconventional assets in the U.S. and, in time, should lead to higher\nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy industry is beating a path to our door, and we are welcoming it with open arms.\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, our stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operationally and financially. Here are the year's highlights for your review:", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Why is an investment grade rating on its debt securities important to CHK?\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt securities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company's borrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake. Higher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in order to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts to sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance Chesapeake's ability to further attract world-class energy companies to participate in our joint venture projects, which profitably monetize a portion of our leasehold investments and also accelerate the development of our resource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest ment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.\n22\n| SOCIAL RESPONSIBILITY", - "page_start": 22, - "page_end": 23, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "LIQUIDS-RICH AREAS\nPermian Basin Chesapeake has built a strong position of approx imately 1.2 million net leasehold acres in the Permian Basin including 560,000 net leasehold acres in the Bone Spring, Avalon, Wolfcamp and Wolfberry unconventional liquids plays. This area has the potential to deliver significant upside as we move toward increasing our oil production substantially in the years ahead. We have developed multiple new horizontal oil projects in this area, where we plan to utilize an average of approximately eight operated rigs in 2011 to further develop our leasehold in the Permian and Delaware basins and estimate we could drill up to 4,400 net wells. 7\nRockies Chesapeake is the second-largest leasehold owner in the Niobrara Shale, Frontier and Codell plays in the Powder River and Denver Julesburg (DJ) basins of Wyoming and Colorado. In February 2011, Chesapeake completed a $1.3 billion joint venture agreement with CNOOC, whereby CNOOC acquired a 33.3% interest in Chesapeake's approximately 800,000 net leasehold acres in the Powder River and DJ basins. CNOOC paid Chesapeake approximately $570 million in cash at closing and will pay an additional $697 million in carries by funding 66.7% of Chesapeake's 8\nNote: Figures do not add to company totals.\n* Compared to last year\n** % of company total\n*** Bossier Shale acreage overlaps with Haynesville Shale acreage\nNM Not meaningful\nshare of drilling and completion expenditures, which Chesapeake expects to occur by year-end 2014. We plan to utilize an average of approximately 11 rigs in 2011 to develop our current 535,000 net leasehold acres with our partner and estimate that we could drill up to 7,600 net wells.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "LIQUIDS-RICH AREAS\nAnadarko Basin The Anadarko Basin is home to four of Chesapeake's liquids-rich plays, which we anticipate will become significant contributors to our growth in the years ahead. Chesapeake was one of the first to utilize modern horizontal drilling methods and has assembled an unrivaled leasehold position in numerous horizontal liquids-rich plays in the basin. Chesapeake will continue drilling with a focus on the Granite Wash, where rates of return are the highest in our company, and with an increasing focus on the Cleveland, Tonkawa and Mississippian liquids-rich unconventional plays. We estimate we could drill up to 11,400 net wells on our Anadarko Basin acreage in the future and plan to utilize an average of 31 operated rigs in 2011 to further develop our current 1.7 million net leasehold acres. 5\n2010 ANNUAL REPORT |\n18\nEagle Ford Shale As part of a growing emphasis on increasing oil and natural gas liquids production, Chesapeake has built the industry's second-largest leasehold position in the Eagle Ford Shale play in South Texas. In 2010 Chesapeake increased its leasehold from 80,000 net acres at the beginning of the year to more than 600,000 net acres. In November 2010, Chesapeake completed a $2.2 billion Eagle Ford Shale joint venture agreement with Beijing-based CNOOC Limited (NYSE:CEO), whereby CNOOC acquired a 33.3% interest in 600,000 net leasehold acres in the Eagle Ford Shale. CNOOC paid Chesapeake approximately $1.12 billion in cash at closing and will pay 75% of Chesapeake's share of drilling and completion expenditures until the $1.08 billion carry obligation has been funded, which Chesapeake expects to occur by year-end 2012. Our focus has been in the wet gas and oil prone portions of the play. We estimate we could drill up to 5,500 net wells on our Eagle Ford acreage and plan to utilize an average of 23 operated rigs in 2011 to further develop our leasehold position in the Eagle Ford Shale. In addition, we believe that the Pearsall Shale should be prospective for natural gas underneath approximately 75% of our Eagle Ford leasehold. 6", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Economic Impact\nWhile much of the U.S. is still struggling to recover from the economic recession, the positive impact of natural gas and oil operations has provided a valuable economic recovery stimulus for states that are home to exploration and development activities. As the nation's second-largest producer of natural gas, a Top 15 producer of liquids and most active driller of new wells, Chesapeake's arrival in a new play stimulates economic activity, augments personal income through jobs and royalty payments, generates substantial tax revenue and sustains communities throughout its operating areas.\nIn addition to the general economic impact of our activities on local economies, the company's tax contributions are substantial. In 2010 Chesapeake paid approximately $675 million in taxes, including ad valorem, severance, sales, employer, and corporate income and franchise taxes. These taxes pay for ongoing government services and also build and maintain schools, recreational facilities, and parks and roads - at a time when state and local governments are still feeling the pinch of recession. We are proud to support America's economy with our growth while also helping to protect the environment through the greater use of clean-burning natural gas and reducing the country's dependence on expensive foreign oil.\nChesapeake also makes contributions that help improve lives and economies in cities where we operate: $25 million in 2010 alone. For example, this past year we donated $200,000 to establish the Chesapeake Environmental and Recycling Center at Goodwill Industries of Central Oklahoma. The center will provide an additional 80 jobs to disabled Oklahomans, as well as help Goodwill recycle 10 million pounds a year, which", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Has the CEO of Chesapeake Energy met with the US President about America's energy production?", - "target_page": 16, - "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Our People\nGreat assets cannot exist without great people, so we take great pride in hiring, training, motivating, rewarding and retaining what we regard\nas the best employees in the industry. From our beginning 22 years ago with 10 employees in Oklahoma City to employing more than 10,000 people across 15 states today, Chesapeake has always focused on building first-class human resources within a distinctive corporate culture. Talk to Chesapeake employees and you will note genuine pride and great enthusiasm about the company and the critical role that we play in delivering increasing quantities of clean and affordable American natural gas and valuable and reliable liquids to energy consumers across the country.\nChesapeake employees are distinctive in other ways as well. They are much younger than the industry average, with half of our almost 4,000 Oklahoma City-based headquarters employees 33 years old or younger. Their enthusiasm and willingness to learn create an\natmosphere of vitality and energy at Chesapeake, important ingredients of our distinctive culture. These attributes, along with a vibrant and attractive corporate headquarters campus, low levels of bureaucracy, great assets and a well-executed corporate strategy combine to create our culture of success and innovation.\nThis has generated extremely positive external feedback as Chesapeake was recently recognized for the fourth consecutive year as one of the FORTUNE 100 Best Companies to Work For ®(3) in the U.S. In fact, we moved up to #32 overall and #1 in our industry - we are very proud of having created and sustained what is now considered the best place to work in all of the U.S. energy production industry.\nIn addition, we were honored in December 2010 at the 12th Annual Platts Global Energy Awards as finalists for CEO of the Year, Community\nFrom our beginning 22 years ago with 10 employees in Oklahoma City to employing more than 10,000 people across 15 states today, Chesapeake has always focused on building first-class human resources within a distinctive corporate culture.\n<< A Chesapeake rig drills in the Marcellus Shale, where the company is the leading leasehold owner, largest producer and most active driller.\nDevelopment Program of the Year, Deal of the Year, Energy Producer of the Year and the Industry Leadership Award. Chesapeake was one of only two companies selected as a finalist in five or more categories. The company was also honored in 2010 with a Certificate of Recognition for our military reserve recruiting efforts, named a 2010 Best Diversity Company by Engineering & Information Technology Magazine and recognized for Best Investor Relations in Energy Sector and Best Investor Relations Website at the 2010 IR Magazine U.S. Awards.", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Recent Events and a Better Way Forward\nYou may be aware that I have been outspoken in attempting to persuade our country's political leadership to recognize that the discovery of vast resources of unconventional natural gas and oil in the U.S. is a complete game changer for our country from an economic, national security and environmental perspective. After two years of my best efforts and the efforts of many others in the industry, most notably T. Boone Pickens,\n2010 ANNUAL REPORT |\n13\nDeveloping great assets begins with great people, such as the hardworking crews of Nomac, Chesapeake's wholly owned drilling subsidiary. Employees take pride in the critical roles they play in finding and delivering natural gas to their fellow Americans.\nRig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.\nI am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable. There appears to be growing recognition that it is spectacularly dangerous for America to continue importing 9 million barrels of oil per day and exporting\nmore than $1 billion per day in national wealth to oil exporting countries.\nAmerica's undiminished appetite for foreign oil has created the largest wealth transfer in the history of the world. The political leadership in Washington, D.C., has not seemed overly concerned about this issue until recently. However, after President Obama's recent speech calling", - "page_start": 13, - "page_end": 15, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Recent Events and a Better Way Forward\nThe good news, however, is that America can now secure a new energy future thanks to Chesapeake and a handful of other leading U.S. E&P companies that have reinvented the process of finding natural gas and oil during the past five years. In doing so, we have discovered twice the resources of natural gas in the U.S. that Saudi Arabia possesses in oil. Furthermore, these same few companies that led the unconventional natural gas revolution have in just the past two years also reinvented the way in which we can find large new oil resources onshore in the U.S. In fact, I believe the U.S. can possibly increase its production of oil from the current 5.8 million barrels per day by 30-50% during the next 5-10 years, thereby potentially reaching the President's 2025 goal of reducing foreign oil imports by 33%, 5-10 years earlier than hoped.\n2010 ANNUAL REPORT |\n15\nThe combination of these vast new discoveries of unconventional natural gas and liquids provides America with a unique future pathway toward greater energy independence, an industrial renaissance, economic rejuvenation and greater national security. I remain fully confident that the marketplace understands this and that over time the U.S. will more fully embrace and utilize clean, affordable, abundant American natural gas and increased domestic oil production as the best alternatives to burning environmentally challenged coal and expensive and dangerous foreign oil.\nThere is now a clear road ahead toward a more sustainable, affordable, dynamic and independent future if America embraces the remarkable gift of energy abundance that Chesapeake has helped discover in the U.S. You have my commitment, and the commitment of more than\nThe combination of these vast new discoveries of unconventional natural gas and liquids provides America with a unique future pathway toward greater energy independence, an industrial renaissance, economic rejuvenation and greater national security.\n10,000 other Chesapeake employees, that every day we are working hard to create shareholder value and a better future for our communities, our states and our country through the continued discovery and development of unconventional natural gas and liquids.\nBest regards,\nAubrey K. McClendon\nChairman and Chief Executive Officer April 15, 2011\n16\n| OPERATING AREAS", - "page_start": 16, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "DEAR FELLOW SHAREHOLDERS »\n2010 was a very important year of transition and achievement for Chesapeake, a year in which we initiated three very important strategic shifts: from asset gathering to asset harvesting, from focusing exclusively on natural gas to a balanced focus on natural gas and liquids and from having a leveraged balance sheet to one worthy of an investment grade rating.\nHome to three distinct forms of hydrocarbons: dry natural gas, natural gas liquids and oil, the Eagle Ford Shale in South Texas epitomizes Chesapeake's shift to a balanced focus on natural gas and liquids.\n2010 also marked a truly transformative year for our industry. We and a handful of our peers enhanced our capabilities to find and produce significant new resources of oil and natural gas liquids (collectively, 'liquids') in unconventional formations. Chesapeake and these other companies combined creativity, innovation and technology to reinvent the way that our industry explores for and produces natural gas and liquids.\nFurthermore, 2010 was the year when global energy companies more fully recognized the importance of these developments and the tremendous opportunities that have emerged in the U.S. Through a wide variety of transactions, including several led by Chesapeake, the global energy industry made it clear that the assets owned by Chesapeake and some of its peers are the most attractive in the world. This realization has already increased the value of highquality unconventional assets in the U.S. and, in time, should lead to higher\nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy industry is beating a path to our door, and we are welcoming it with open arms.\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, our stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operationally and financially. Here are the year's highlights for your review:", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "It is often said that the energy industry has an aging work force that is fast approaching retirement age. How is Chesapeake addressing this?\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down turn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong competition from other industries lured away many of the best and brightest science and technology graduates, and today many experienced professionals who stayed in the industry through the downturn are approaching retirement age. As a result, one of our industry's greatest challenges over the past 10 years has been to develop a new generation of natural gas and oil professionals who have the knowledge and experience required to meet the nation's growing energy needs.\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting and training a new generation of energy professionals would impact the company's future success and its ability to compete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs and decided to create a world-class college recruiting and intern program to recruit the most promising industry talent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go on to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive\nMartha Burger\nSenior Vice President Human and Corporate Resources\nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads and career counselors at the more than 31 universities where we actively recruit.\nAs a result of these efforts, young professionals in a wide range of disciplines, from scientists and engineers to land management and legal specialists, are being groomed to take over the reins as they learn the business through mentoring, extensive training, development opportunities and challenging work assignments. They are generously rewarded with excellent compensation and benefits, as well as an industry-leading working environment that encourages camaraderie and teamwork. The success of Chesapeake's strategy is apparent: the average age of the company's geoscience, land and engineering departments has dropped from 49 in 2000 to 36 today. In addition, the average age of the company's 4,000 Oklahoma City headquarters employees is 33. Even as some of Chesapeake's employees retire, the company is well equipped with a seasoned work force that is prepared to support and lead the way in Chesapeake's continued growth.\nJeff Fisher Senior Vice President - Production\n2010 ANNUAL REPORT |\n21", - "page_start": 21, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Economic Impact\nWhile much of the U.S. is still struggling to recover from the economic recession, the positive impact of natural gas and oil operations has provided a valuable economic recovery stimulus for states that are home to exploration and development activities. As the nation's second-largest producer of natural gas, a Top 15 producer of liquids and most active driller of new wells, Chesapeake's arrival in a new play stimulates economic activity, augments personal income through jobs and royalty payments, generates substantial tax revenue and sustains communities throughout its operating areas.\nIn addition to the general economic impact of our activities on local economies, the company's tax contributions are substantial. In 2010 Chesapeake paid approximately $675 million in taxes, including ad valorem, severance, sales, employer, and corporate income and franchise taxes. These taxes pay for ongoing government services and also build and maintain schools, recreational facilities, and parks and roads - at a time when state and local governments are still feeling the pinch of recession. We are proud to support America's economy with our growth while also helping to protect the environment through the greater use of clean-burning natural gas and reducing the country's dependence on expensive foreign oil.\nChesapeake also makes contributions that help improve lives and economies in cities where we operate: $25 million in 2010 alone. For example, this past year we donated $200,000 to establish the Chesapeake Environmental and Recycling Center at Goodwill Industries of Central Oklahoma. The center will provide an additional 80 jobs to disabled Oklahomans, as well as help Goodwill recycle 10 million pounds a year, which", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Educational Impact\nWe are also proud to help prepare tomorrow's leaders today. In 2010 Chesapeake supported universities, schools, academic chairs, scholarships and other educational programs with contributions totaling $5.4 million.\nInvesting in programs that promote technology and innovation is a key to our country's success. That's why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM), a public, tuition-free, residential high school located in Oklahoma City for juniors and seniors with exceptional abilities. The extremely competitive school is helping train the next generation of scientists and mathematicians.\nWe also established the Chesapeake Energy Presidential Scholars Program at the Oklahoma City University Meinders School of Business, making a $5.0 million commitment to be distributed over the next five years. The Chesapeake Scholars Program will provide up to $25,000 per year in tuition\nto selected students pursuing careers in finance, economics, accounting, marketing, business administration, computer science and information technology. In addition, scholars will take part in a Chesapeake Presidential Leadership Course facilitated by faculty members in coordination with designated Chesapeake leadership coaches, including a Chesapeake senior vice president and OCU alumni.\nIn 2007 Chesapeake launched a scholarship program in Texas with an initial $1.25 million contribution, challenging the cities of Fort Worth and Dallas to match its gift within a year. The cities responded and matched the gift, so Chesapeake in 2008 added another $1.25 million to the fund, bringing the total to $3.75 million. The Chesapeake Scholarship Fund currently funds the cost of higher education for 48 minority students. The fund provides each student $20,000 a year for up to four years at the school of their choice. To date more than $1.0 million has been distributed to deserving local students.\nTo help ensure the training of qualified geologists, engineers, landmen and energy lawyers in the next generation, we award scholarships to students pursuing energy-related degrees. We also help mentor them through Chesapeake's Peak Program. Junior- and senior-level scholarship recipients are paired with Chesapeake employee mentors who help develop students' knowledge and provide career advice. There are currently 25 mentors and 40 scholarship recipients participating in the Peak Program.", - "page_start": 25, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Short-Term Pain for Long-Term Gain\nDespite this all-star lineup of global partners and investors, some other investors have not yet fully recognized the benefits of our industry leadership in acquiring unconventional natural gas and liquids assets. Whether it was our leveraged balance sheet during recent tough recessionary times, our heavy focus on natural gas during a time of persistent market pessimism about natural gas prices or our large capital investments in undeveloped liquids-rich leasehold undertaken to enable Chesapeake to remain an industry leader in the years ahead, it is clear\nThrough a wide variety of transactions, including several led by Chesapeake, the global energy industry made it clear that the assets owned by Chesapeake and some of its peers are the most attractive in the world.\n<< Aubrey K. McClendon, Co-Founder, Chairman and Chief Executive Officer\nthat we were less popular in the stock market in 2010 than we were in 2009, when our stock price increased by 60%.\nWe anticipated that some market unpopularity in 2010 would likely be the price we would pay as we positioned Chesapeake to be the leader not only in unconventional U.S. natural gas, but also in unconventional U.S. liquids. However, now that we have largely completed the investments needed to accomplish this transition to a portfolio balanced with liquids, the rebound in our stock price could be sharp as investors begin to focus more clearly on Chesapeake's three-way transition from an asset gatherer to an asset harvester, from less natural gas exposure to more liquids exposure and from a leveraged balance sheet to one worthy of an investment grade rating.\nAccordingly, in early January 2011, we announced our '25/25 Plan,' a two-year plan designed to reduce our long-term debt by 25% while still growing the company's production by 25%. We designed this plan to articulate very clearly the benefits of becoming an asset harvester\n6\n| LETTER TO SHAREHOLDERS", - "page_start": 6, - "page_end": 7, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "AMERICA'S PREMIER ENERGY RESOURCE BASE »\nChesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has built a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica unconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise gained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of natural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of divestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays.\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion cubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end 2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the U.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities - almost 50 years worth of drilling opportunities - on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake's ownership position in our key operating areas.\nUnconcerned by a Chesapeake drilling rig, antelope continue their daily routines in southeastern Wyoming's Powder River Basin where the company is developing the promising Niobrara Play.\n17\n| OPERATING AREAS", - "page_start": 17, - "page_end": 19, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - } - ] -] \ No newline at end of file